Analysis
-
max time kernel
145s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 15:40
Static task
static1
Behavioral task
behavioral1
Sample
22e3ba427f72b889c04192665811db26_JaffaCakes118.exe
Resource
win7-20240221-en
General
-
Target
22e3ba427f72b889c04192665811db26_JaffaCakes118.exe
-
Size
188KB
-
MD5
22e3ba427f72b889c04192665811db26
-
SHA1
dfc3194e1ee99a8709f8a1cecec9859362e38aaa
-
SHA256
06a7e14ac643090406c115d729ebf9a6749b195eab695f61077f52a6db5b469e
-
SHA512
fa64ab9f4c19bdfd6eaa91539a1f3a20a7aa30e50e7745b11263c144fb02203f6fac59d8b60b451300ffa0823dc424f63e4dce4ec7c424bc1817e9424c2233f2
-
SSDEEP
3072:p3s1aEReBKD2SEKPWUDF7Wq6vYcOhbXmgHxguyQDwB/jVmqD+dXipNtzY8Bp0LPI:NsFOBUDF7CgcabXBh3DC/aipNta7xE5L
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Cvgagc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Cvgagc.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe -
Executes dropped EXE 2 IoCs
pid Process 2572 Cvgagc.exe 2672 Cvgagc.exe -
Loads dropped DLL 3 IoCs
pid Process 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 2572 Cvgagc.exe -
resource yara_rule behavioral1/memory/2132-2-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-5-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-9-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-10-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-13-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-8-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-7-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-11-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-6-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2132-4-0x0000000001D30000-0x0000000002DBE000-memory.dmp upx behavioral1/memory/2572-47-0x0000000001E60000-0x0000000002EEE000-memory.dmp upx behavioral1/memory/2572-45-0x0000000001E60000-0x0000000002EEE000-memory.dmp upx behavioral1/memory/2572-44-0x0000000001E60000-0x0000000002EEE000-memory.dmp upx behavioral1/memory/2572-38-0x0000000001E60000-0x0000000002EEE000-memory.dmp upx -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Cvgagc.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Cvgagc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Windows\CurrentVersion\Run\Cvgagc = "C:\\Users\\Admin\\AppData\\Roaming\\Cvgagc.exe" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Cvgagc.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2132 set thread context of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2572 set thread context of 2672 2572 Cvgagc.exe 30 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A6D3E1E1-3952-11EF-B85E-52C7B7C5B073} = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "3" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-1298544033-3225604241-2703760938-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "426183130" IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2672 Cvgagc.exe Token: SeDebugPrivilege 2748 IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2120 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2120 IEXPLORE.EXE 2120 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE 2748 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 2132 wrote to memory of 3004 2132 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 28 PID 3004 wrote to memory of 2572 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 29 PID 3004 wrote to memory of 2572 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 29 PID 3004 wrote to memory of 2572 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 29 PID 3004 wrote to memory of 2572 3004 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe 29 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2572 wrote to memory of 2672 2572 Cvgagc.exe 30 PID 2672 wrote to memory of 2504 2672 Cvgagc.exe 31 PID 2672 wrote to memory of 2504 2672 Cvgagc.exe 31 PID 2672 wrote to memory of 2504 2672 Cvgagc.exe 31 PID 2672 wrote to memory of 2504 2672 Cvgagc.exe 31 PID 2504 wrote to memory of 2120 2504 iexplore.exe 32 PID 2504 wrote to memory of 2120 2504 iexplore.exe 32 PID 2504 wrote to memory of 2120 2504 iexplore.exe 32 PID 2504 wrote to memory of 2120 2504 iexplore.exe 32 PID 2120 wrote to memory of 2748 2120 IEXPLORE.EXE 34 PID 2120 wrote to memory of 2748 2120 IEXPLORE.EXE 34 PID 2120 wrote to memory of 2748 2120 IEXPLORE.EXE 34 PID 2120 wrote to memory of 2748 2120 IEXPLORE.EXE 34 PID 2672 wrote to memory of 2748 2672 Cvgagc.exe 34 PID 2672 wrote to memory of 2748 2672 Cvgagc.exe 34 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 22e3ba427f72b889c04192665811db26_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Cvgagc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\22e3ba427f72b889c04192665811db26_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\22e3ba427f72b889c04192665811db26_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\22e3ba427f72b889c04192665811db26_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\22e3ba427f72b889c04192665811db26_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Roaming\Cvgagc.exe"C:\Users\Admin\AppData\Roaming\Cvgagc.exe"3⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Loads dropped DLL
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2572 -
C:\Users\Admin\AppData\Roaming\Cvgagc.exeC:\Users\Admin\AppData\Roaming\Cvgagc.exe4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"6⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2120 CREDAT:275457 /prefetch:27⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5db5ffafca7d5bf0a5773e2be71b1e5a8
SHA1b80cbd2df9bca6fde005ad43f6aacbafa2a9d767
SHA256726bc45dac41bfeb2f3f0cd99b78f92f811878125be36f5ae3310b00f0a67fa4
SHA5120b78e9e74f09863bacaf7908de804d5e841f663b67faae916f8a522a462a430cd6d7923f4763091c5cad57624623aca0e9154b4415d2fe3d71f106e75a1d2834
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5260eb53920eab8a0d5eb0acbaa73b3dc
SHA16e5263f03d1aac5e85594bf20da07db99a585f9e
SHA25669686a469387bd9515c7d921f0e36e4dfea672e1c6e56ae54135c5c0cab9e5b6
SHA512a70d1c5b4403e951cfd6167ab4142f6eca6bc7a9128eb308c5a7cf213a99e53f0413e6b8cd1cc8de746076f79553fe3c5e16ae81ed9bc097c3906e5bf5d6e37a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bfdb7bcddfcffb5ad07c8fb9c9686ff4
SHA103be1992a0c53932f4a387a72dbd6cf778f87582
SHA256a4c06fbeb649befbc5b71a281c1594552bb7c5363cc5c47d6ffd8996e9d08c43
SHA5124351b20183b157d7786b9b2575f28ca7f199fa1ffca2022e1ce1175f27ba3dc763454ceea8e561695a4f23b749adf5f3175a41c4121c7cb3095900b2171706be
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD53ef0bcadf1ab45993e20d6aba5f3f200
SHA1fa511a0c26737badf507908a02a825c1e89af2c7
SHA256d42afb2dbce89280668c3577064c34cb6437e8e8fc7fa051905c024237f438dc
SHA512521cc6599db766817c5621e7643a4738631eb1ae41402017c0f57c0433653afd8a488b4b7789c677eb76f1591c86465957a07e046df2a2f799299f516e58cca5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD583e031836e0c1b4350b2432a6f3101e3
SHA18dbfaa215aabd12f99952064405e5391607aef05
SHA256788930dd2f3bc8feb8970d4cba9ca592fa4a3f904a19ee89c4758fc36198d4c9
SHA512c6fb27116c53594b809ae4e85b4813af1a1a3a91c09835e7a0a1a96959908483caa7e7104e0ebdc6b164825446932becb52127e2a7dedb83405652176a56f6de
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD580391c761e548ec26ca3fd6d7d134949
SHA1beb20b9e063fb1b05fa2ea7fab06d32327be2b4a
SHA256aa18cbed59054598d48f4209e5e371796141314ab59d1ae25d18d910e88d9131
SHA512c3e85ef751520470d8f053deaeb106817461f01478d8f47ba688d34ae396fed8f2ab0ca44ccf486053474d642283c63c931f50a74ea59958f1c80f598fe37096
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD504f0ba8711235723db39a798574100f8
SHA1fa9c3f262a5d0229a047fc92919036ac63a5d342
SHA2563ffddd32dbcf5eb547e0b0de4a8d6af76a97f4821d749096f284297d7de32a26
SHA51220464f6b80d0c971ca54bbaffe68922440e5bd53cd61e10ba801b63dd7f3a9a1afe6351d1ce2c871e5d8493b461fbe3ff38a880409f37b1cd0e847395fa8b891
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58f292b59c86806733b442762c4de0891
SHA142f0f08d733f03e732064ea63b0cfd889fb22e3d
SHA256e39134ff45b181b2b0a920f184ff9b7c79a31d3a4c9fb5069eba3a8a94f4377f
SHA5120707ac498255480c7874d8766bd2d857d2aa3f933fe79c981417c925e3188b1ab0f4a85d1d3db4e1cf7a197119c0b9c23d129208d1f8835807818071a8df95cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5bbe585b4b160f55d6234e23add404d3c
SHA19895347d040bcc1850f390dd45181c3568494f43
SHA256bc0d78533ef214330563973ef6c47748d9b5259b3f7ba8c77d3c86ccaffeda68
SHA512a9846160572c65a680318ebaaa8bde01f89b1fa32745149ef2dc6ba3bbd124c1b93659e80bd4fc695a9cd1a344a794fc25748707054a803df0d5a4d55d8ec1b1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5cb0643583b02329f151291abf602ce51
SHA1f3c806cc3569a8e5d24fcd368959fb4411d16472
SHA2567ad50e782fb30f02065036367bb064e083e7bdc0f82011f32e6cd07c1c3ebdc7
SHA512b07f1f38d01e1e71a4c6b0a564d22fa1cc6c61ddc8934a4d03bbf8ed6b8c704f82b1e7aa57bebf10356451cb54884afea9fbbd661183238698bde5991abbd1b5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD514aa733b3a74fe3d11370e7678328aee
SHA18bb2ebbfa97d9a02d21591e3fe266276cb7a7520
SHA2561ea41bb470cc09e07e1b6368e2969b75c93f9a9097722c64b1bed8a471a7c334
SHA512a1b6a6521bf4209e3ee32773ee5f3691060f391535ecc3878a32ac3ce6b9b5aa72e28f871806451faba01c3833d4e8f4b6dd81030a5c1422d5ac9362e6cb091c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50e1c50d5856d43ab2768572511d1f262
SHA1e6a3e37d3df52bfddb71e4938e96664025ecba88
SHA256badec3e2c96219f2eedc1dee0edac56485eeada8e121a8be04676d6c9b33980b
SHA5123545d58e2e322371e91316de85b31b36ac1e1f80c53a538d302ab3ca39c440d4acdc14decd5f2e888f7ea86b31adbcad1326b91184da3093655275e36c914dd9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c460bf6f3525d9f8fcab6aa4d5ce344
SHA1a620ca01949ac2387aeefdaaaeb3c9d031bfee27
SHA2560d99f3be810881b33fae2f7697e1b3ccd0f81871ff606ab5dee0e398772783bf
SHA51276c069061ba4ba6fb10504279637b4a9a821d5ca8d3bc9c44349f0930dab91812f4828cbbcca94c776bf6df486f92a1b73e996a02a9a40f296c93b46c27dc922
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD50170c56a21cb7b3fa8b3c7b925b1b345
SHA19ff816e39624ec14d32ac066c8209b8bce89e9a9
SHA256eda8269bc4a757ecfc22851d90c892b28050058ad0f1f27d8448bc013dedb51c
SHA5127aea2a2b0696c3b669eab613c8b194d6e035f86ccfbd77705c1dc106cf2ae6079d9e2aa8734e1da3043931c8ee0cf3e1d1398a03e90745974d7d0fc8e546547e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5def3ff979d957b2ee954acd135ec41f2
SHA1c57061ec19b496e1099b6ba11b2ecc4ee8b2a35a
SHA256f526d39b8f4d663d8d05c72d309e1f90f151e022685f279e77ff8e615681d14f
SHA51228ca62df1b7b5a35f304fc173b146cb7a1d48a852bb056a7a77b52ae6242f043b44231c48331ebcf9a1ff999af3b44217f1934d637649d23d3790d3267694e36
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58514cd1595958f9beaf6d5aa1bcf270a
SHA10a2c36b1c7d800c333355a0d4a9813af8cb31672
SHA256ce4edbf20edf77f8dd8dda940458767620aef195ebc7d78f0d0164edbcd0628e
SHA5123cdbc2c4a814b6307d2e82fa0375756306d5254d0a1d28269765c9a48dad5852a90841c8b1640f11bf01182380993ffee2606cf3748190a40a942a388b88d59b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57c0892b3af54b9b6c9f4fc42c866ce53
SHA1f3f36fe48b22074118167cde11a8cfdab913db4c
SHA2568c9e2574a285b4b814c003c8bf72b89793c9da6df561b07ab5781f7fbe6dc4c2
SHA5129ebafa5478e55c53aca9fdb57809bcd60dec07bbc61ca5374e09cd103b72db9ff84015c411b4d65bafb8fe311973a9b42ea1220b0ede7bc6ffcede649520aeee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58732ec0c18059409db306ca5f39133bc
SHA194745bfaefa1979de7c615fbd0d569031ec48e71
SHA25663de3750e6090c55d8c0f7aca8090d29b9be2d87925b7a9c8c159fb6940a5654
SHA512a5977553886ee6b8d5821a862f1ab06e87c10b4fd2030797d0dac1c4acc4ec0f73037de72c24b1b31df5e200c78ee88a1daf30a5e21b9f8b78d920295dcc7c61
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD57d14a73d2df80d6a0c3661dcdac04b59
SHA1e1848d8f1a16e1d999545884a582f137542a84df
SHA25671114335c599f4f07ada2ecd7103c8703e6ce38ed4455b706e13d7a906273e9c
SHA51251fdd917cd50ef0427687f27896ff6651a53ae10d883bf1bfb411ef3cbc67b7167876f78f0d987774e011cbc364078f5e8ee58a83d5d7a94511bf886c55b0c22
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
257B
MD584fe1725c2235ccc1de62d227fc319e7
SHA1f0fc855846801c933c84a4619d1b8c31d0ba12e4
SHA256937751d79b275e93eb85a965831f805e19c643c0c4b3158eccadf217182ebdb9
SHA512988e946afce368d143f9b1a51aa732818c1a881b4478a4c97996ae0fb12805efe1078c512bc5604d776490cf26399dbd455c9c6d14ba179300406b1376d1b01c
-
Filesize
188KB
MD522e3ba427f72b889c04192665811db26
SHA1dfc3194e1ee99a8709f8a1cecec9859362e38aaa
SHA25606a7e14ac643090406c115d729ebf9a6749b195eab695f61077f52a6db5b469e
SHA512fa64ab9f4c19bdfd6eaa91539a1f3a20a7aa30e50e7745b11263c144fb02203f6fac59d8b60b451300ffa0823dc424f63e4dce4ec7c424bc1817e9424c2233f2