Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
14-06-2024 01:45
Static task
static1
Behavioral task
behavioral1
Sample
a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe
Resource
win7-20240419-en
General
-
Target
a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe
-
Size
3.8MB
-
MD5
a79ab104e6460c53f606ed19adba0f8d
-
SHA1
6d43166366e7c0ca0be382222fb28e4b8eccc116
-
SHA256
72b8ae8a48ac728a53bc503473d1ef244e830fbb7e20e451fb85999177c91754
-
SHA512
e66cc91122441285205a4fb01698b1e0e6ccf83a6e78a0a9d56128036711bee3e298bf8e0f73ed421bff3ff906db45cbc6f8c086089d32f77aba292c7c773e09
-
SSDEEP
98304:/Ft/3rN7Yu/5hx4EU7Ddl4LP9gYsFCJVVZE8EorPdq3BF:nbN7Yg5cEUfdGzRsFCJzGHxRF
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 8 IoCs
Processes:
regedit.exeregedit.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\PublicProfile\EnableFirewall = "0" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" regedit.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\PublicProfile regedit.exe -
Processes:
regedit.exeregedit.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\PromptOnSecureDesktop = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\ConsentPromptBehaviorAdmin = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" regedit.exe -
Modifies Windows Firewall 2 TTPs 1 IoCs
Processes:
netsh.exepid process 3668 netsh.exe -
Sets file to hidden 1 TTPs 3 IoCs
Modifies file attributes to stop it showing in Explorer etc.
Processes:
attrib.exeattrib.exeattrib.exepid process 4036 attrib.exe 3236 attrib.exe 4484 attrib.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
Processes:
resource yara_rule C:\Log\vp8encoder.dll acprotect -
Checks computer location settings 2 TTPs 5 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exeWScript.execmd.exeWScript.exeWScript.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 8 IoCs
Processes:
Rar.exelnlvbpt.exelnlvbpt.exelnlvbpt.exelnlvbpt.exeedylafnzjw.exeedylafnzjw.exeedylafnzjw.exepid process 2684 Rar.exe 2020 lnlvbpt.exe 392 lnlvbpt.exe 2600 lnlvbpt.exe 2432 lnlvbpt.exe 5088 edylafnzjw.exe 4944 edylafnzjw.exe 1028 edylafnzjw.exe -
Processes:
resource yara_rule C:\Log\lnlvbpt.exe upx C:\Log\edylafnzjw.exe upx C:\Log\vp8encoder.dll upx behavioral2/memory/2020-55-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/2020-56-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/392-58-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/5088-66-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/2600-67-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/1028-72-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/1028-73-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/5088-75-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/4944-76-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/2432-74-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/4944-79-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/2432-81-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/4944-83-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/2432-84-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/4944-87-0x0000000000400000-0x00000000009B6000-memory.dmp upx behavioral2/memory/2432-88-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/2432-94-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/2432-98-0x0000000000400000-0x0000000000AB2000-memory.dmp upx behavioral2/memory/4944-100-0x0000000000400000-0x00000000009B6000-memory.dmp upx -
Launches sc.exe 3 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exepid process 412 sc.exe 2552 sc.exe 4952 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Delays execution with timeout.exe 5 IoCs
Processes:
timeout.exetimeout.exetimeout.exetimeout.exetimeout.exepid process 2936 timeout.exe 1428 timeout.exe 4180 timeout.exe 4064 timeout.exe 4016 timeout.exe -
Kills process with taskkill 10 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exepid process 916 taskkill.exe 4592 taskkill.exe 224 taskkill.exe 2316 taskkill.exe 3736 taskkill.exe 4448 taskkill.exe 2968 taskkill.exe 2856 taskkill.exe 4936 taskkill.exe 4248 taskkill.exe -
Modifies registry class 2 IoCs
Processes:
a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.execmd.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3665033694-1447845302-680750983-1000_Classes\Local Settings cmd.exe -
Runs .reg file with regedit 2 IoCs
Processes:
regedit.exeregedit.exepid process 3500 regedit.exe 4084 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
lnlvbpt.exelnlvbpt.exelnlvbpt.exelnlvbpt.exeedylafnzjw.exepid process 2020 lnlvbpt.exe 2020 lnlvbpt.exe 2020 lnlvbpt.exe 2020 lnlvbpt.exe 2020 lnlvbpt.exe 2020 lnlvbpt.exe 392 lnlvbpt.exe 392 lnlvbpt.exe 2600 lnlvbpt.exe 2600 lnlvbpt.exe 2432 lnlvbpt.exe 2432 lnlvbpt.exe 2432 lnlvbpt.exe 2432 lnlvbpt.exe 2432 lnlvbpt.exe 2432 lnlvbpt.exe 5088 edylafnzjw.exe 5088 edylafnzjw.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
edylafnzjw.exepid process 1028 edylafnzjw.exe -
Suspicious use of AdjustPrivilegeToken 15 IoCs
Processes:
taskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exetaskkill.exelnlvbpt.exelnlvbpt.exelnlvbpt.exetaskkill.exetaskkill.exedescription pid process Token: SeDebugPrivilege 2968 taskkill.exe Token: SeDebugPrivilege 224 taskkill.exe Token: SeDebugPrivilege 2856 taskkill.exe Token: SeDebugPrivilege 4936 taskkill.exe Token: SeDebugPrivilege 2316 taskkill.exe Token: SeDebugPrivilege 3736 taskkill.exe Token: SeDebugPrivilege 4448 taskkill.exe Token: SeDebugPrivilege 916 taskkill.exe Token: SeDebugPrivilege 2020 lnlvbpt.exe Token: SeDebugPrivilege 2600 lnlvbpt.exe Token: SeTakeOwnershipPrivilege 2432 lnlvbpt.exe Token: SeTcbPrivilege 2432 lnlvbpt.exe Token: SeTcbPrivilege 2432 lnlvbpt.exe Token: SeDebugPrivilege 4592 taskkill.exe Token: SeDebugPrivilege 4248 taskkill.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
Processes:
lnlvbpt.exelnlvbpt.exelnlvbpt.exelnlvbpt.exepid process 2020 lnlvbpt.exe 392 lnlvbpt.exe 2600 lnlvbpt.exe 2432 lnlvbpt.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exeWScript.execmd.exeWScript.execmd.exenet.exeWScript.exedescription pid process target process PID 2440 wrote to memory of 2464 2440 a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe WScript.exe PID 2440 wrote to memory of 2464 2440 a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe WScript.exe PID 2440 wrote to memory of 2464 2440 a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe WScript.exe PID 2464 wrote to memory of 896 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 896 2464 WScript.exe cmd.exe PID 2464 wrote to memory of 896 2464 WScript.exe cmd.exe PID 896 wrote to memory of 2684 896 cmd.exe Rar.exe PID 896 wrote to memory of 2684 896 cmd.exe Rar.exe PID 896 wrote to memory of 2684 896 cmd.exe Rar.exe PID 896 wrote to memory of 2936 896 cmd.exe timeout.exe PID 896 wrote to memory of 2936 896 cmd.exe timeout.exe PID 896 wrote to memory of 2936 896 cmd.exe timeout.exe PID 896 wrote to memory of 5048 896 cmd.exe WScript.exe PID 896 wrote to memory of 5048 896 cmd.exe WScript.exe PID 896 wrote to memory of 5048 896 cmd.exe WScript.exe PID 896 wrote to memory of 1428 896 cmd.exe timeout.exe PID 896 wrote to memory of 1428 896 cmd.exe timeout.exe PID 896 wrote to memory of 1428 896 cmd.exe timeout.exe PID 5048 wrote to memory of 1988 5048 WScript.exe cmd.exe PID 5048 wrote to memory of 1988 5048 WScript.exe cmd.exe PID 5048 wrote to memory of 1988 5048 WScript.exe cmd.exe PID 1988 wrote to memory of 3668 1988 cmd.exe netsh.exe PID 1988 wrote to memory of 3668 1988 cmd.exe netsh.exe PID 1988 wrote to memory of 3668 1988 cmd.exe netsh.exe PID 1988 wrote to memory of 2968 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2968 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2968 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 224 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 224 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 224 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2856 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2856 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2856 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 4936 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 4936 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 4936 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2316 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2316 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2316 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 3736 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 3736 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 3736 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 4448 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 4448 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 4448 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 916 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 916 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 916 1988 cmd.exe taskkill.exe PID 1988 wrote to memory of 2248 1988 cmd.exe net.exe PID 1988 wrote to memory of 2248 1988 cmd.exe net.exe PID 1988 wrote to memory of 2248 1988 cmd.exe net.exe PID 896 wrote to memory of 2208 896 cmd.exe WScript.exe PID 896 wrote to memory of 2208 896 cmd.exe WScript.exe PID 896 wrote to memory of 2208 896 cmd.exe WScript.exe PID 2248 wrote to memory of 4264 2248 net.exe net1.exe PID 2248 wrote to memory of 4264 2248 net.exe net1.exe PID 2248 wrote to memory of 4264 2248 net.exe net1.exe PID 1988 wrote to memory of 820 1988 cmd.exe reg.exe PID 1988 wrote to memory of 820 1988 cmd.exe reg.exe PID 1988 wrote to memory of 820 1988 cmd.exe reg.exe PID 1988 wrote to memory of 3436 1988 cmd.exe reg.exe PID 1988 wrote to memory of 3436 1988 cmd.exe reg.exe PID 1988 wrote to memory of 3436 1988 cmd.exe reg.exe PID 2208 wrote to memory of 2332 2208 WScript.exe cmd.exe -
Views/modifies file attributes 1 TTPs 3 IoCs
Processes:
attrib.exeattrib.exeattrib.exepid process 4036 attrib.exe 3236 attrib.exe 4484 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a79ab104e6460c53f606ed19adba0f8d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Log\run.vbs"2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Log\pause.bat" "3⤵
- Checks computer location settings
- Modifies registry class
- Suspicious use of WriteProcessMemory
-
C:\Log\Rar.exe"Rar.exe" e -p74449175 db.rar4⤵
- Executes dropped EXE
-
C:\Windows\SysWOW64\timeout.exetimeout 54⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Log\install.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Log\install.bat" "5⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rutserv.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rfusclient.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im systemc.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im drivemanag.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im dumprep.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im winlogs.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im lnlvbpt.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im edylafnzjw.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\net.exenet stop RManService6⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop RManService7⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKLM\SYSTEM\Remote Manipulator System" /f6⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_LOCAL_MACHINE\SYSTEM\HardwareConfig\DEVICEMAP" /f6⤵
-
C:\Windows\SysWOW64\reg.exereg delete "HKEY_CURRENT_USER\Software\TektonIT\Remote Manipulator System" /f6⤵
-
C:\Windows\SysWOW64\regedit.exeregedit /s "regedit.reg"6⤵
- Modifies firewall policy service
- UAC bypass
- Runs .reg file with regedit
-
C:\Windows\SysWOW64\timeout.exetimeout 16⤵
- Delays execution with timeout.exe
-
C:\Folder58\lnlvbpt.exelnlvbpt.exe /silentinstall6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Folder58\lnlvbpt.exelnlvbpt.exe /firewall6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\regedit.exeregedit /s regedit.reg6⤵
- Modifies firewall policy service
- UAC bypass
- Runs .reg file with regedit
-
C:\Folder58\lnlvbpt.exelnlvbpt.exe /start6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Windows\SysWOW64\sc.exesc failure RManService reset= 0 actions= restart/1000/restart/1000/restart/10006⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc config RManService obj= LocalSystem type= interact type= own6⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\sc.exesc config RManService DisplayName= "RManService"6⤵
- Launches sc.exe
-
C:\Windows\SysWOW64\timeout.exetimeout 26⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Folder58\*.*"6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Folder58"6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\attrib.exeattrib +s +h "C:\Log"6⤵
- Sets file to hidden
- Views/modifies file attributes
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rar.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im rar.exe6⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\timeout.exetimeout 24⤵
- Delays execution with timeout.exe
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Log\del.vbs"4⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Log\del.bat" "5⤵
-
C:\Windows\SysWOW64\chcp.comchcp 12516⤵
-
C:\Windows\SysWOW64\timeout.exetimeout 156⤵
- Delays execution with timeout.exe
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=3808,i,11751898164297348119,13021661521765644467,262144 --variations-seed-version --mojo-platform-channel-handle=4120 /prefetch:81⤵
-
C:\Folder58\lnlvbpt.exeC:\Folder58\lnlvbpt.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
-
C:\Folder58\edylafnzjw.exeC:\Folder58\edylafnzjw.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
-
C:\Folder58\edylafnzjw.exeC:\Folder58\edylafnzjw.exe /tray3⤵
- Executes dropped EXE
- Suspicious behavior: SetClipboardViewer
-
C:\Folder58\edylafnzjw.exeC:\Folder58\edylafnzjw.exe /tray2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix ATT&CK v13
Privilege Escalation
Create or Modify System Process
2Windows Service
2Abuse Elevation Control Mechanism
1Bypass User Account Control
1Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Log\Rar.exeFilesize
370KB
MD52e86a9862257a0cf723ceef3868a1a12
SHA1a4324281823f0800132bf13f5ad3860e6b5532c6
SHA2562356220cfa9159b463d762e2833f647a04fa58b4c627fcb4fb1773d199656ab8
SHA5123a8e0389637fc8a3f8bab130326fe091ead8c0575a1a3861622466d4e3c37818c928bc74af4d14b5bb3080dfae46e41fee2c362a7093b5aa3b9df39110c8e9de
-
C:\Log\db.rarFilesize
3.4MB
MD5e67c1e16896a5bf46db982ef0a964a5e
SHA106e6a756a34f13651139843965811782bf9eb4f2
SHA2562830b03f610fd029775a39c852d62c65135b9d159a3404210fce61c47899289d
SHA512559db3f04edb5f4f73354260400bbbe2e7dfccf2449da3dc6cd6f778787116514eedb93f3d98eee156376e9283a838f1386c74d87a1a91eae1667065aa317d14
-
C:\Log\del.batFilesize
103B
MD500a1287d2fee5eb67a15b9db4e5410f6
SHA152fe326b86c112a23e5a7ab1d5017f01042e55a4
SHA256138ff861033ef88c1ac1b7d3c69e207cb160aa7d0b9773df6496c1efdc29aaa3
SHA512e3ef7a8d0b36aeaa0c41d720680d948f31a7873b656984e065d4af3138e12d66095e6db7d38913abdf2468ac8b7fc254c66f51dae000aeb8dc7e91d0734980c0
-
C:\Log\del.vbsFilesize
80B
MD52130b30813709d5150e4b13d50f9779e
SHA194dd1a873f2c9ceb990fce6027f6a18a175465f5
SHA256d2b02b775b3f29dfa0508e9243f1ca85a1c8c86bc30ca7f4651b2ddcc6c7bea3
SHA512a04983c5fd57f21b5b0680132e51a8d28b0ceb3b42fab2de301b4ca8f236f892709159b0f4eda4801f9f712febb468d87ae3b59e573de990d4e6f2e055b4d68e
-
C:\Log\edylafnzjw.exeFilesize
1.3MB
MD5a2b60a6296d0b1ef68e1a278ff325c48
SHA128c29abdac82d4d2f32d79d46290af6913df6b62
SHA256193ccbcbcbcdf92525532daee0f99c029e67f5210ba85a858c64d8b6f9b263b7
SHA512c4c0ffabdc23aeed68d3d39525b8d23c327694b9e994f408e10cf4f4a6dfc446e1a9abbfea90386f47d1c21d6760b93c87fed17ed78dd70b7e03b372b067dad3
-
C:\Log\install.batFilesize
1KB
MD51657ec254bd530d720feb95f733208f2
SHA106063279be64fa2c326776d655a013e74c3fdc2a
SHA2569bbd15b2fe0f66e68ee7fc98056ee9a6e38a21b77e99e4a3980927c42e0b58f7
SHA512161722a982846641648db7fcfffe62424948fcd8c9981c581d46502aeda2f12f48fbadde3f7f5cfa49b66a1136a6f083ac65c9cb333ed55aefdfccef654e0222
-
C:\Log\install.vbsFilesize
91B
MD51f2c79274a03a035333b15ed68fee8e4
SHA12e87549734e5a9e48d4ef75fa9fb06e9cfda2a5b
SHA25650ec14a13ee65068dc43b7d884fc4d6fa7baa0e5a6095a469ce658dd8d78452f
SHA5128ddec880f4af6ac1a066c5fa4fc0f57a9c97f038a8098a8a073bfe06bd2353b0ba7dc106ab6eaba5f36e057acb54b023b2a56cfc37df5b04bf5263f12f92b750
-
C:\Log\lnlvbpt.exeFilesize
1.5MB
MD5e8bbb2b910f98b95d4636d4e6adb83a5
SHA142a2236e59349256ad69ff85203147da244a77fb
SHA25689e2089c247364f0ee4f66effb08ed25f94d2cb4825185269cd089bb2298a4cf
SHA512876c7250e132c5383ea793edb691067d2745d4b1db2d72215e8177d6176f4fec8376d3735893a02e0ff6bb25cb79ba2fd82f00264efc6ba44b23f7b4efcf37cd
-
C:\Log\pause.batFilesize
304B
MD558dcf7bf33288f8e6ecc0a6c6145e9df
SHA10adc27888d7781281082f701085bee10cdeb7d31
SHA256a80a58f075bd1868e481766e159584d4d8033c06558e39bbd93b089ce3661b86
SHA51270ff386708564aad7b54f503e510d737d110c6ec6e7ef64599238efafa02073ed436851cf23c642952d3a8b311ca47332c8409fb8face5aea2f9f3f9c4334c9b
-
C:\Log\regedit.regFilesize
12KB
MD5c3d8b8e22bfd840ad896ec9783198193
SHA1f7cb4382f3581aae90e3ac731d76ef8423a4719d
SHA25653aa65cb59b600d73373532923132eea30e773179eb85637fc874634d28c1657
SHA51217bdba91ff68b5630ee8f6fd64dbf700ffbdae9d2be028ab02cfb7e768f2a3de0c0deecd26c8d3ee6414f5394f88e53d3a82234dbacbafff072e660f36310806
-
C:\Log\run.vbsFilesize
84B
MD56a5f5a48072a1adae96d2bd88848dcff
SHA1b381fa864db6c521cbf1133a68acf1db4baa7005
SHA256c7758bb2fdf207306a5b83c9916bfffcc5e85efe14c8f00d18e2b6639b9780fe
SHA512d11101b11a95d39a2b23411955e869f92451e1613b150c15d953cccf0f741fb6c3cf082124af8b67d4eb40feb112e1167a1e25bdeab9e433af3ccc5384ccb90c
-
C:\Log\vp8encoder.dllFilesize
593KB
MD56298c0af3d1d563834a218a9cc9f54bd
SHA10185cd591e454ed072e5a5077b25c612f6849dc9
SHA25681af82019d9f45a697a8ca1788f2c5c0205af9892efd94879dedf4bc06db4172
SHA512389d89053689537cdb582c0e8a7951a84549f0c36484db4346c31bdbe7cb93141f6a354069eb13e550297dc8ec35cd6899746e0c16abc876a0fe542cc450fffe
-
memory/392-58-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/1028-72-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/1028-73-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/2020-55-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2020-56-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2432-74-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2432-98-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2432-94-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2432-88-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2432-84-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2432-81-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/2600-67-0x0000000000400000-0x0000000000AB2000-memory.dmpFilesize
6.7MB
-
memory/4944-83-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/4944-79-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/4944-87-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/4944-76-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/4944-100-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/5088-66-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB
-
memory/5088-75-0x0000000000400000-0x00000000009B6000-memory.dmpFilesize
5.7MB