Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    148s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    17/06/2024, 06:31 UTC

General

  • Target

    b735ef594c8cf3da235820c2657181d3_JaffaCakes118.exe

  • Size

    521KB

  • MD5

    b735ef594c8cf3da235820c2657181d3

  • SHA1

    14fa8012c0e076f7a4b8b45998225344c34f5515

  • SHA256

    00f49b9869e9e93891bb7a753a48b2cdb8ddc8abdee7800f8e3fa63d4491168c

  • SHA512

    e1bde8b8206b4f979666457967fff3ca927840b1f473402722210e1967bc4d0e240287900f001e4037176b7cfd082d3da4359c20a7fea3ab185b5a9b9e195a27

  • SSDEEP

    6144:UZfec9EbXDk6RkdKJrG1VVE+I5E2EorG1VVE+IRuHOJrG1VVE+I5E2EorG1VVE+5:UZWtI6RkcuVku9O9uVku5

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Blocks application from running via registry modification 17 IoCs

    Adds application to list of disallowed applications.

  • Sets file execution options in registry 2 TTPs 20 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 29 IoCs
  • Drops file in Windows directory 9 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Runs net.exe
  • Runs regedit.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b735ef594c8cf3da235820c2657181d3_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\b735ef594c8cf3da235820c2657181d3_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2756
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Option.bat
      2⤵
        PID:2212
      • C:\Windows\SysWOW64\net.exe
        net.exe start schedule /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start schedule /y
          3⤵
            PID:2572
        • C:\Windows\SysWOW64\At.exe
          At.exe 6:34:10 AM C:\Windows\Help\HelpCat.exe
          2⤵
            PID:2636
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c at 6:33:12 AM C:\Windows\Sysinf.bat
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:2560
            • C:\Windows\SysWOW64\at.exe
              at 6:33:12 AM C:\Windows\Sysinf.bat
              3⤵
                PID:2464
            • C:\Windows\SysWOW64\cmd.exe
              cmd /c at 6:36:12 AM C:\Windows\Sysinf.bat
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2564
              • C:\Windows\SysWOW64\at.exe
                at 6:36:12 AM C:\Windows\Sysinf.bat
                3⤵
                  PID:2432
              • C:\Windows\SysWOW64\net.exe
                net.exe stop wscsvc /y
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:2752
                • C:\Windows\SysWOW64\net1.exe
                  C:\Windows\system32\net1 stop wscsvc /y
                  3⤵
                    PID:2552
                • C:\Windows\SysWOW64\net.exe
                  net.exe stop sharedaccess /y
                  2⤵
                    PID:2308
                    • C:\Windows\SysWOW64\net1.exe
                      C:\Windows\system32\net1 stop sharedaccess /y
                      3⤵
                        PID:1968
                    • C:\Windows\SysWOW64\net.exe
                      net.exe stop wuauserv /y
                      2⤵
                        PID:2568
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop wuauserv /y
                          3⤵
                            PID:2792
                        • C:\Windows\SysWOW64\net.exe
                          net.exe stop srservice /y
                          2⤵
                            PID:2480
                            • C:\Windows\SysWOW64\net1.exe
                              C:\Windows\system32\net1 stop srservice /y
                              3⤵
                                PID:2728
                            • C:\Windows\SysWOW64\net.exe
                              net.exe stop 360timeprot /y
                              2⤵
                                PID:2448
                                • C:\Windows\SysWOW64\net1.exe
                                  C:\Windows\system32\net1 stop 360timeprot /y
                                  3⤵
                                    PID:2684
                                • C:\Windows\SysWOW64\sc.exe
                                  C:\Windows\system32\sc.exe config srservice start= disabled
                                  2⤵
                                  • Launches sc.exe
                                  PID:2508
                                • C:\Windows\SysWOW64\sc.exe
                                  C:\Windows\system32\sc.exe config SharedAccess start= disabled
                                  2⤵
                                  • Launches sc.exe
                                  PID:2912
                                • C:\Windows\SysWOW64\sc.exe
                                  C:\Windows\system32\sc.exe config wscsvc start= disabled
                                  2⤵
                                  • Launches sc.exe
                                  PID:2932
                                • C:\Windows\SysWOW64\sc.exe
                                  C:\Windows\system32\sc.exe config srservice start= disabled
                                  2⤵
                                  • Launches sc.exe
                                  PID:2676
                                • C:\Windows\SysWOW64\regedit.exe
                                  regedit.exe /s C:\Windows\regedt32.sys
                                  2⤵
                                  • Modifies visibility of file extensions in Explorer
                                  • Blocks application from running via registry modification
                                  • Sets file execution options in registry
                                  • Runs regedit.exe
                                  PID:760
                                • C:\Windows\SysWOW64\reg.exe
                                  C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                                  2⤵
                                    PID:1996
                                  • C:\Windows\SysWOW64\reg.exe
                                    C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                                    2⤵
                                      PID:2008
                                    • C:\Windows\system\KavUpda.exe
                                      C:\Windows\system\KavUpda.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Drops autorun.inf file
                                      • Drops file in System32 directory
                                      • Drops file in Windows directory
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2220
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c C:\Windows\system32\Option.bat
                                        3⤵
                                          PID:1672
                                        • C:\Windows\SysWOW64\net.exe
                                          net.exe start schedule /y
                                          3⤵
                                            PID:540
                                            • C:\Windows\SysWOW64\net1.exe
                                              C:\Windows\system32\net1 start schedule /y
                                              4⤵
                                                PID:2900
                                            • C:\Windows\SysWOW64\At.exe
                                              At.exe 6:34:14 AM C:\Windows\Help\HelpCat.exe
                                              3⤵
                                                PID:1528
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c at 6:33:16 AM C:\Windows\Sysinf.bat
                                                3⤵
                                                  PID:1428
                                                  • C:\Windows\SysWOW64\at.exe
                                                    at 6:33:16 AM C:\Windows\Sysinf.bat
                                                    4⤵
                                                      PID:860
                                                  • C:\Windows\SysWOW64\cmd.exe
                                                    cmd /c at 6:36:16 AM C:\Windows\Sysinf.bat
                                                    3⤵
                                                      PID:1336
                                                      • C:\Windows\SysWOW64\at.exe
                                                        at 6:36:16 AM C:\Windows\Sysinf.bat
                                                        4⤵
                                                          PID:1488
                                                      • C:\Windows\SysWOW64\net.exe
                                                        net.exe stop wscsvc /y
                                                        3⤵
                                                          PID:640
                                                          • C:\Windows\SysWOW64\net1.exe
                                                            C:\Windows\system32\net1 stop wscsvc /y
                                                            4⤵
                                                              PID:1784
                                                          • C:\Windows\SysWOW64\net.exe
                                                            net.exe stop sharedaccess /y
                                                            3⤵
                                                              PID:2412
                                                              • C:\Windows\SysWOW64\net1.exe
                                                                C:\Windows\system32\net1 stop sharedaccess /y
                                                                4⤵
                                                                  PID:2312
                                                              • C:\Windows\SysWOW64\net.exe
                                                                net.exe stop wuauserv /y
                                                                3⤵
                                                                  PID:2084
                                                                  • C:\Windows\SysWOW64\net1.exe
                                                                    C:\Windows\system32\net1 stop wuauserv /y
                                                                    4⤵
                                                                      PID:2152
                                                                  • C:\Windows\SysWOW64\net.exe
                                                                    net.exe stop srservice /y
                                                                    3⤵
                                                                      PID:2264
                                                                      • C:\Windows\SysWOW64\net1.exe
                                                                        C:\Windows\system32\net1 stop srservice /y
                                                                        4⤵
                                                                          PID:356
                                                                      • C:\Windows\SysWOW64\net.exe
                                                                        net.exe stop 360timeprot /y
                                                                        3⤵
                                                                          PID:1624
                                                                          • C:\Windows\SysWOW64\net1.exe
                                                                            C:\Windows\system32\net1 stop 360timeprot /y
                                                                            4⤵
                                                                              PID:1632
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            C:\Windows\system32\sc.exe config srservice start= disabled
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:1820
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            C:\Windows\system32\sc.exe config SharedAccess start= disabled
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:1520
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            C:\Windows\system32\sc.exe config wscsvc start= disabled
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:1140
                                                                          • C:\Windows\SysWOW64\sc.exe
                                                                            C:\Windows\system32\sc.exe config srservice start= disabled
                                                                            3⤵
                                                                            • Launches sc.exe
                                                                            PID:3052
                                                                          • C:\Windows\SysWOW64\reg.exe
                                                                            C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                                                                            3⤵
                                                                              PID:1780
                                                                            • C:\Windows\SysWOW64\reg.exe
                                                                              C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                                                                              3⤵
                                                                                PID:1828
                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                3⤵
                                                                                  PID:1932
                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                    attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                    4⤵
                                                                                    • Views/modifies file attributes
                                                                                    PID:1260
                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                  cmd /c rmdir F:\Autorun.inf /s /q
                                                                                  3⤵
                                                                                    PID:1640
                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                    cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                    3⤵
                                                                                      PID:2988
                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                        attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                        4⤵
                                                                                        • Views/modifies file attributes
                                                                                        PID:2716
                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                      cmd /c rmdir C:\Autorun.inf /s /q
                                                                                      3⤵
                                                                                        PID:2524
                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                        cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                        3⤵
                                                                                          PID:2912
                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                            attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                            4⤵
                                                                                            • Views/modifies file attributes
                                                                                            PID:2708
                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                          cmd /c rmdir F:\Autorun.inf /s /q
                                                                                          3⤵
                                                                                            PID:1940
                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                            cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                            3⤵
                                                                                              PID:2936
                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                4⤵
                                                                                                • Views/modifies file attributes
                                                                                                PID:1992
                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                              cmd /c rmdir C:\Autorun.inf /s /q
                                                                                              3⤵
                                                                                                PID:1984
                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                3⤵
                                                                                                  PID:2768
                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                    attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                    4⤵
                                                                                                    • Views/modifies file attributes
                                                                                                    PID:1664
                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                  cmd /c rmdir F:\Autorun.inf /s /q
                                                                                                  3⤵
                                                                                                    PID:2560
                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                    cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                    3⤵
                                                                                                      PID:1512
                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                        attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                        4⤵
                                                                                                        • Views/modifies file attributes
                                                                                                        PID:996
                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                      cmd /c rmdir C:\Autorun.inf /s /q
                                                                                                      3⤵
                                                                                                        PID:2276
                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                        cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                        3⤵
                                                                                                          PID:2180
                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                            attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                            4⤵
                                                                                                            • Views/modifies file attributes
                                                                                                            PID:1528
                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                          cmd /c rmdir F:\Autorun.inf /s /q
                                                                                                          3⤵
                                                                                                            PID:2856
                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                            cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                            3⤵
                                                                                                              PID:1636
                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                4⤵
                                                                                                                • Views/modifies file attributes
                                                                                                                PID:832
                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                              cmd /c rmdir C:\Autorun.inf /s /q
                                                                                                              3⤵
                                                                                                                PID:1052
                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                3⤵
                                                                                                                  PID:876
                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                    attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                    4⤵
                                                                                                                    • Views/modifies file attributes
                                                                                                                    PID:2264
                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                  cmd /c rmdir F:\Autorun.inf /s /q
                                                                                                                  3⤵
                                                                                                                    PID:2336
                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                    cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                    3⤵
                                                                                                                      PID:3012
                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                        attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                        4⤵
                                                                                                                        • Views/modifies file attributes
                                                                                                                        PID:1336
                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                      cmd /c rmdir C:\Autorun.inf /s /q
                                                                                                                      3⤵
                                                                                                                        PID:3052
                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                        cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                        3⤵
                                                                                                                          PID:2036
                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                            attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                            4⤵
                                                                                                                            • Views/modifies file attributes
                                                                                                                            PID:2572
                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                          cmd /c rmdir F:\Autorun.inf /s /q
                                                                                                                          3⤵
                                                                                                                            PID:2368
                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                            cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                            3⤵
                                                                                                                              PID:1160
                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                                4⤵
                                                                                                                                • Views/modifies file attributes
                                                                                                                                PID:2552
                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                              cmd /c rmdir C:\Autorun.inf /s /q
                                                                                                                              3⤵
                                                                                                                                PID:1956
                                                                                                                              • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                                3⤵
                                                                                                                                  PID:2652
                                                                                                                                  • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                    attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                                    4⤵
                                                                                                                                    • Views/modifies file attributes
                                                                                                                                    PID:2936
                                                                                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                  cmd /c rmdir F:\Autorun.inf /s /q
                                                                                                                                  3⤵
                                                                                                                                    PID:2772
                                                                                                                                  • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                    cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                                    3⤵
                                                                                                                                      PID:2460
                                                                                                                                      • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                        attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                                        4⤵
                                                                                                                                        • Views/modifies file attributes
                                                                                                                                        PID:2884
                                                                                                                                    • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                      cmd /c rmdir C:\Autorun.inf /s /q
                                                                                                                                      3⤵
                                                                                                                                        PID:2564
                                                                                                                                      • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                        cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                                        3⤵
                                                                                                                                          PID:1512
                                                                                                                                          • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                            attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                                                                                                            4⤵
                                                                                                                                            • Views/modifies file attributes
                                                                                                                                            PID:704
                                                                                                                                        • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                          cmd /c rmdir F:\Autorun.inf /s /q
                                                                                                                                          3⤵
                                                                                                                                            PID:2284
                                                                                                                                          • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                            cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                                            3⤵
                                                                                                                                              PID:1404
                                                                                                                                              • C:\Windows\SysWOW64\attrib.exe
                                                                                                                                                attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                                                                                                                4⤵
                                                                                                                                                • Views/modifies file attributes
                                                                                                                                                PID:912
                                                                                                                                            • C:\Windows\SysWOW64\cmd.exe
                                                                                                                                              cmd /c rmdir C:\Autorun.inf /s /q
                                                                                                                                              3⤵
                                                                                                                                                PID:1764
                                                                                                                                            • C:\Users\Admin\AppData\Local\Temp\b735ef594c8cf3da235820c2657181d3_JaffaCakes118~4.exe
                                                                                                                                              b735ef594c8cf3da235820c2657181d3_JaffaCakes118~4.exe
                                                                                                                                              2⤵
                                                                                                                                              • Executes dropped EXE
                                                                                                                                              PID:2080
                                                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                                                              net.exe stop wscsvc /y
                                                                                                                                              2⤵
                                                                                                                                                PID:1524
                                                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                  C:\Windows\system32\net1 stop wscsvc /y
                                                                                                                                                  3⤵
                                                                                                                                                    PID:1284
                                                                                                                                                • C:\Windows\SysWOW64\net.exe
                                                                                                                                                  net.exe stop sharedaccess /y
                                                                                                                                                  2⤵
                                                                                                                                                    PID:1868
                                                                                                                                                    • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                      C:\Windows\system32\net1 stop sharedaccess /y
                                                                                                                                                      3⤵
                                                                                                                                                        PID:1560
                                                                                                                                                    • C:\Windows\SysWOW64\net.exe
                                                                                                                                                      net.exe stop wuauserv /y
                                                                                                                                                      2⤵
                                                                                                                                                        PID:2176
                                                                                                                                                        • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                          C:\Windows\system32\net1 stop wuauserv /y
                                                                                                                                                          3⤵
                                                                                                                                                            PID:2880
                                                                                                                                                        • C:\Windows\SysWOW64\net.exe
                                                                                                                                                          net.exe stop srservice /y
                                                                                                                                                          2⤵
                                                                                                                                                            PID:2864
                                                                                                                                                            • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                              C:\Windows\system32\net1 stop srservice /y
                                                                                                                                                              3⤵
                                                                                                                                                                PID:1760
                                                                                                                                                            • C:\Windows\SysWOW64\net.exe
                                                                                                                                                              net.exe stop 360timeprot /y
                                                                                                                                                              2⤵
                                                                                                                                                                PID:992
                                                                                                                                                                • C:\Windows\SysWOW64\net1.exe
                                                                                                                                                                  C:\Windows\system32\net1 stop 360timeprot /y
                                                                                                                                                                  3⤵
                                                                                                                                                                    PID:2184
                                                                                                                                                              • C:\Windows\system32\taskeng.exe
                                                                                                                                                                taskeng.exe {584CA7D2-2D3D-41D3-ADBB-4A8B3777620C} S-1-5-18:NT AUTHORITY\System:Service:
                                                                                                                                                                1⤵
                                                                                                                                                                  PID:2688

                                                                                                                                                                Network

                                                                                                                                                                MITRE ATT&CK Enterprise v15

                                                                                                                                                                Replay Monitor

                                                                                                                                                                Loading Replay Monitor...

                                                                                                                                                                Downloads

                                                                                                                                                                • C:\Windows\SysWOW64\Option.bat

                                                                                                                                                                  Filesize

                                                                                                                                                                  82B

                                                                                                                                                                  MD5

                                                                                                                                                                  3f7fbd2eb34892646e93fd5e6e343512

                                                                                                                                                                  SHA1

                                                                                                                                                                  265ac1061b54f62350fb7a5f57e566454d013a66

                                                                                                                                                                  SHA256

                                                                                                                                                                  e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7

                                                                                                                                                                  SHA512

                                                                                                                                                                  53d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140

                                                                                                                                                                • C:\Windows\Sysinf.bat

                                                                                                                                                                  Filesize

                                                                                                                                                                  460B

                                                                                                                                                                  MD5

                                                                                                                                                                  7db3d565d6ddbe65a8b0e093910e7dcd

                                                                                                                                                                  SHA1

                                                                                                                                                                  d4804e6180c6e74ba79d3343f2f2ccb15e502f12

                                                                                                                                                                  SHA256

                                                                                                                                                                  a2778cb87fd88c7508ffd506a8ff8d58d0ffc02156f846956e5e99c6cb3d2f3f

                                                                                                                                                                  SHA512

                                                                                                                                                                  0b3d1d0f44feba9dd78903ff77fdeaea834d930990a86641fb2e4ce04da280d33f6bee0ae0b1320e4070cbe20824062e45b52e5cad797c5985d8e31dce1ef82b

                                                                                                                                                                • C:\Windows\regedt32.sys

                                                                                                                                                                  Filesize

                                                                                                                                                                  2KB

                                                                                                                                                                  MD5

                                                                                                                                                                  e7d7ec66bd61fac3843c98650b0c68f6

                                                                                                                                                                  SHA1

                                                                                                                                                                  a15ae06e1be51038863650746368a71024539bac

                                                                                                                                                                  SHA256

                                                                                                                                                                  6475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8

                                                                                                                                                                  SHA512

                                                                                                                                                                  ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6

                                                                                                                                                                • C:\Windows\system\KavUpda.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  499KB

                                                                                                                                                                  MD5

                                                                                                                                                                  67073a62804d474d3636d50585dedfcb

                                                                                                                                                                  SHA1

                                                                                                                                                                  0d45ad492e7bb9e0768e63280042f08b51b142d5

                                                                                                                                                                  SHA256

                                                                                                                                                                  f317ccf5e13fbe735b0eeae8aa385e4c8902baaa7cfb48d341d0cbfe9cd64e3e

                                                                                                                                                                  SHA512

                                                                                                                                                                  d3797389e40b1d61d873f681871815d4e2e9136f426e2f957a6a859883eadcde2d7931638286f7a870063254dfd8cc75401e4f9d35cdd47ebcfe90a4160004af

                                                                                                                                                                • F:\Autorun.inf

                                                                                                                                                                  Filesize

                                                                                                                                                                  237B

                                                                                                                                                                  MD5

                                                                                                                                                                  94bcd02c5afd5918b4446345e7a5ded9

                                                                                                                                                                  SHA1

                                                                                                                                                                  79839238e84be225132e1382fae6333dfc4906a1

                                                                                                                                                                  SHA256

                                                                                                                                                                  5d9f41e4f886926dae2ed8a57807708110d3c6964ab462be21462bff0088d9a1

                                                                                                                                                                  SHA512

                                                                                                                                                                  149f6bd49fc3b62fa5f41666bfb3a58060514eec1b61c6aa1ac4c75417c840b028e701eb5533460eb00e2fee8543379564bc47d7477264771d81b99a0caab500

                                                                                                                                                                • \Users\Admin\AppData\Local\Temp\b735ef594c8cf3da235820c2657181d3_JaffaCakes118~4.exe

                                                                                                                                                                  Filesize

                                                                                                                                                                  22KB

                                                                                                                                                                  MD5

                                                                                                                                                                  191408b034c8a553a083f9049040b4d1

                                                                                                                                                                  SHA1

                                                                                                                                                                  083d0d4b0644e073812d0ed82393041a7c4c11c4

                                                                                                                                                                  SHA256

                                                                                                                                                                  98d5816f74aa6dc0d309bed60816bce693b89b6c84dc531df120b5db9ef1847c

                                                                                                                                                                  SHA512

                                                                                                                                                                  651abefd0e4ca65e142fe252abbbb8267e8e829121e11724751ea6869249e78952a3611504fa584efdc42e66bf14463dc12586067f1226c6ea9f187fa2759acd

                                                                                                                                                                • memory/2756-0-0x0000000000400000-0x0000000000436000-memory.dmp

                                                                                                                                                                  Filesize

                                                                                                                                                                  216KB

                                                                                                                                                                We care about your privacy.

                                                                                                                                                                This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.