Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
25-06-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
0df0bdd5f09012598f0d6fb4c8719820
-
SHA1
c1b4d4a7e76e6112ca7e5b9b7df8cdde85f7c0ca
-
SHA256
b2f311453fb3153464a82d1cb371fef1fd155b23cf9e6c41652b7c113b57763c
-
SHA512
78ac94e9bfabd32bbb96df4c963604cce0722eac41d492a70307a17b0ca20f3da4cc9040b4c48455973aa9838b65075d9bd9a391e78c66faeee41a7f003b6b41
-
SSDEEP
768:9SyCk0yiLw6K7njb5Vf0XghCF7RlH5sf1zBmQzTGfmgyq/4U:ikViCnoXghCF7PHWf1zwQVgv/F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 2036 userinit.exe 5284 system.exe 5292 system.exe 6104 system.exe 4408 system.exe 2916 system.exe 3812 system.exe 3664 system.exe 1912 system.exe 4076 system.exe 392 system.exe 5632 system.exe 1788 system.exe 3428 system.exe 5728 system.exe 5420 system.exe 3648 system.exe 4640 system.exe 5512 system.exe 3656 system.exe 3312 system.exe 3092 system.exe 1180 system.exe 4852 system.exe 2852 system.exe 3304 system.exe 3692 system.exe 4480 system.exe 3068 system.exe 2180 system.exe 428 system.exe 2460 system.exe 3500 system.exe 2812 system.exe 6120 system.exe 1032 system.exe 1392 system.exe 3104 system.exe 3764 system.exe 732 system.exe 6048 system.exe 3076 system.exe 6124 system.exe 4360 system.exe 5616 system.exe 396 system.exe 4572 system.exe 6136 system.exe 6004 system.exe 4700 system.exe 812 system.exe 1196 system.exe 5192 system.exe 2804 system.exe 4956 system.exe 1984 system.exe 452 system.exe 5284 system.exe 2076 system.exe 5164 system.exe 5204 system.exe 4560 system.exe 5264 system.exe 4092 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe File created C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 2036 userinit.exe 2036 userinit.exe 2036 userinit.exe 2036 userinit.exe 5284 system.exe 5284 system.exe 2036 userinit.exe 2036 userinit.exe 5292 system.exe 5292 system.exe 2036 userinit.exe 2036 userinit.exe 6104 system.exe 6104 system.exe 2036 userinit.exe 2036 userinit.exe 4408 system.exe 4408 system.exe 2036 userinit.exe 2036 userinit.exe 2916 system.exe 2916 system.exe 2036 userinit.exe 2036 userinit.exe 3812 system.exe 3812 system.exe 2036 userinit.exe 2036 userinit.exe 3664 system.exe 3664 system.exe 2036 userinit.exe 2036 userinit.exe 1912 system.exe 1912 system.exe 2036 userinit.exe 2036 userinit.exe 4076 system.exe 4076 system.exe 2036 userinit.exe 2036 userinit.exe 392 system.exe 392 system.exe 2036 userinit.exe 2036 userinit.exe 5632 system.exe 5632 system.exe 2036 userinit.exe 2036 userinit.exe 1788 system.exe 1788 system.exe 2036 userinit.exe 2036 userinit.exe 3428 system.exe 3428 system.exe 2036 userinit.exe 2036 userinit.exe 5728 system.exe 5728 system.exe 2036 userinit.exe 2036 userinit.exe 5420 system.exe 5420 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2036 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 2036 userinit.exe 2036 userinit.exe 5284 system.exe 5284 system.exe 5292 system.exe 5292 system.exe 6104 system.exe 6104 system.exe 4408 system.exe 4408 system.exe 2916 system.exe 2916 system.exe 3812 system.exe 3812 system.exe 3664 system.exe 3664 system.exe 1912 system.exe 1912 system.exe 4076 system.exe 4076 system.exe 392 system.exe 392 system.exe 5632 system.exe 5632 system.exe 1788 system.exe 1788 system.exe 3428 system.exe 3428 system.exe 5728 system.exe 5728 system.exe 5420 system.exe 5420 system.exe 3648 system.exe 3648 system.exe 4640 system.exe 4640 system.exe 5512 system.exe 5512 system.exe 3656 system.exe 3656 system.exe 3312 system.exe 3312 system.exe 3092 system.exe 3092 system.exe 1180 system.exe 1180 system.exe 4852 system.exe 4852 system.exe 2852 system.exe 2852 system.exe 3304 system.exe 3304 system.exe 3692 system.exe 3692 system.exe 4480 system.exe 4480 system.exe 3068 system.exe 3068 system.exe 2180 system.exe 2180 system.exe 428 system.exe 428 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4952 wrote to memory of 2036 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 80 PID 4952 wrote to memory of 2036 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 80 PID 4952 wrote to memory of 2036 4952 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 80 PID 2036 wrote to memory of 5284 2036 userinit.exe 81 PID 2036 wrote to memory of 5284 2036 userinit.exe 81 PID 2036 wrote to memory of 5284 2036 userinit.exe 81 PID 2036 wrote to memory of 5292 2036 userinit.exe 82 PID 2036 wrote to memory of 5292 2036 userinit.exe 82 PID 2036 wrote to memory of 5292 2036 userinit.exe 82 PID 2036 wrote to memory of 6104 2036 userinit.exe 85 PID 2036 wrote to memory of 6104 2036 userinit.exe 85 PID 2036 wrote to memory of 6104 2036 userinit.exe 85 PID 2036 wrote to memory of 4408 2036 userinit.exe 88 PID 2036 wrote to memory of 4408 2036 userinit.exe 88 PID 2036 wrote to memory of 4408 2036 userinit.exe 88 PID 2036 wrote to memory of 2916 2036 userinit.exe 89 PID 2036 wrote to memory of 2916 2036 userinit.exe 89 PID 2036 wrote to memory of 2916 2036 userinit.exe 89 PID 2036 wrote to memory of 3812 2036 userinit.exe 90 PID 2036 wrote to memory of 3812 2036 userinit.exe 90 PID 2036 wrote to memory of 3812 2036 userinit.exe 90 PID 2036 wrote to memory of 3664 2036 userinit.exe 92 PID 2036 wrote to memory of 3664 2036 userinit.exe 92 PID 2036 wrote to memory of 3664 2036 userinit.exe 92 PID 2036 wrote to memory of 1912 2036 userinit.exe 93 PID 2036 wrote to memory of 1912 2036 userinit.exe 93 PID 2036 wrote to memory of 1912 2036 userinit.exe 93 PID 2036 wrote to memory of 4076 2036 userinit.exe 96 PID 2036 wrote to memory of 4076 2036 userinit.exe 96 PID 2036 wrote to memory of 4076 2036 userinit.exe 96 PID 2036 wrote to memory of 392 2036 userinit.exe 97 PID 2036 wrote to memory of 392 2036 userinit.exe 97 PID 2036 wrote to memory of 392 2036 userinit.exe 97 PID 2036 wrote to memory of 5632 2036 userinit.exe 98 PID 2036 wrote to memory of 5632 2036 userinit.exe 98 PID 2036 wrote to memory of 5632 2036 userinit.exe 98 PID 2036 wrote to memory of 1788 2036 userinit.exe 99 PID 2036 wrote to memory of 1788 2036 userinit.exe 99 PID 2036 wrote to memory of 1788 2036 userinit.exe 99 PID 2036 wrote to memory of 3428 2036 userinit.exe 100 PID 2036 wrote to memory of 3428 2036 userinit.exe 100 PID 2036 wrote to memory of 3428 2036 userinit.exe 100 PID 2036 wrote to memory of 5728 2036 userinit.exe 101 PID 2036 wrote to memory of 5728 2036 userinit.exe 101 PID 2036 wrote to memory of 5728 2036 userinit.exe 101 PID 2036 wrote to memory of 5420 2036 userinit.exe 102 PID 2036 wrote to memory of 5420 2036 userinit.exe 102 PID 2036 wrote to memory of 5420 2036 userinit.exe 102 PID 2036 wrote to memory of 3648 2036 userinit.exe 103 PID 2036 wrote to memory of 3648 2036 userinit.exe 103 PID 2036 wrote to memory of 3648 2036 userinit.exe 103 PID 2036 wrote to memory of 4640 2036 userinit.exe 104 PID 2036 wrote to memory of 4640 2036 userinit.exe 104 PID 2036 wrote to memory of 4640 2036 userinit.exe 104 PID 2036 wrote to memory of 5512 2036 userinit.exe 105 PID 2036 wrote to memory of 5512 2036 userinit.exe 105 PID 2036 wrote to memory of 5512 2036 userinit.exe 105 PID 2036 wrote to memory of 3656 2036 userinit.exe 106 PID 2036 wrote to memory of 3656 2036 userinit.exe 106 PID 2036 wrote to memory of 3656 2036 userinit.exe 106 PID 2036 wrote to memory of 3312 2036 userinit.exe 107 PID 2036 wrote to memory of 3312 2036 userinit.exe 107 PID 2036 wrote to memory of 3312 2036 userinit.exe 107 PID 2036 wrote to memory of 3092 2036 userinit.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4952 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5284
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5292
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2916
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:392
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5632
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5728
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5420
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5512
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3312
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3092
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3304
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3500
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:6120
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1392
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:732
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:6048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:6124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4360
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5616
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4572
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:6136
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:6004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5192
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4956
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1984
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5284
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5204
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4092
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2940
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1200
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4988
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6096
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4492
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1184
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2772
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5692
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1660
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2248
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1252
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2052
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2792
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2348
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2984
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5356
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5380
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4400
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3036
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:316
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:732
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1308
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6136
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4104
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4436
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3424
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2996
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4632
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4344
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4760
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4364
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3964
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3732
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4904
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1312
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:6060
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50df0bdd5f09012598f0d6fb4c8719820
SHA1c1b4d4a7e76e6112ca7e5b9b7df8cdde85f7c0ca
SHA256b2f311453fb3153464a82d1cb371fef1fd155b23cf9e6c41652b7c113b57763c
SHA51278ac94e9bfabd32bbb96df4c963604cce0722eac41d492a70307a17b0ca20f3da4cc9040b4c48455973aa9838b65075d9bd9a391e78c66faeee41a7f003b6b41