Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15-07-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe
-
Size
936KB
-
MD5
48bc87a9204fe25e1a18bf2640dfed61
-
SHA1
7430784fe61fb6e8de9cdd5b5365e81b9bb793e0
-
SHA256
0ce512a25f2e1f57c65984db9e01998ce514000672050e32a7ec6b624ecdea6f
-
SHA512
ad4f61800bdcd419e166fec4855708d10817f864393b96564e58fd9f165f480011ace5b1b73eb633880d9d65589016e87908c880738fc404523c448611243b36
-
SSDEEP
24576:V7q55ahO1N+AuTpoLb+/k1AMDhHxRHONMJ5:V255ahO1N+DTpoX+/m9HyNMT
Malware Config
Signatures
-
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/4512-40-0x0000000000400000-0x0000000000433000-memory.dmp family_isrstealer behavioral2/memory/4512-42-0x0000000000400000-0x0000000000433000-memory.dmp family_isrstealer behavioral2/memory/4512-56-0x0000000000400000-0x0000000000433000-memory.dmp family_isrstealer -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exebie_7install86.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-384068567-2943195810-3631207890-1000\Control Panel\International\Geo\Nation bie_7install86.exe -
Executes dropped EXE 6 IoCs
Processes:
bie_7install86.exeY0X6xp55d.exeY0X6xp55d.exeY0X6xp55d.exeY0X6xp55d.exebie_kms.exepid process 412 bie_7install86.exe 4440 Y0X6xp55d.exe 2232 Y0X6xp55d.exe 4512 Y0X6xp55d.exe 4320 Y0X6xp55d.exe 3676 bie_kms.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Processes:
resource yara_rule behavioral2/memory/4320-47-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4320-53-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4320-49-0x0000000000400000-0x0000000000453000-memory.dmp upx behavioral2/memory/4320-50-0x0000000000400000-0x0000000000453000-memory.dmp upx -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
Processes:
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exeY0X6xp55d.exedescription ioc process File opened for modification \??\PhysicalDrive0 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 Y0X6xp55d.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exeY0X6xp55d.exeY0X6xp55d.exeY0X6xp55d.exedescription pid process target process PID 4036 set thread context of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4440 set thread context of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 set thread context of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 set thread context of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe -
Drops file in Windows directory 2 IoCs
Processes:
cmd.exedescription ioc process File created C:\Windows\check.txt cmd.exe File opened for modification C:\Windows\check.txt cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of SetWindowsHookEx 5 IoCs
Processes:
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exeY0X6xp55d.exeY0X6xp55d.exeY0X6xp55d.exepid process 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 4440 Y0X6xp55d.exe 2232 Y0X6xp55d.exe 4512 Y0X6xp55d.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exebie_7install86.execmd.exeY0X6xp55d.exeY0X6xp55d.exeY0X6xp55d.exedescription pid process target process PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4036 wrote to memory of 4592 4036 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe PID 4592 wrote to memory of 412 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe bie_7install86.exe PID 4592 wrote to memory of 412 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe bie_7install86.exe PID 4592 wrote to memory of 412 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe bie_7install86.exe PID 4592 wrote to memory of 4440 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe Y0X6xp55d.exe PID 4592 wrote to memory of 4440 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe Y0X6xp55d.exe PID 4592 wrote to memory of 4440 4592 48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe Y0X6xp55d.exe PID 412 wrote to memory of 3804 412 bie_7install86.exe cmd.exe PID 412 wrote to memory of 3804 412 bie_7install86.exe cmd.exe PID 412 wrote to memory of 3804 412 bie_7install86.exe cmd.exe PID 3804 wrote to memory of 3416 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 3416 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 3416 3804 cmd.exe cscript.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 4440 wrote to memory of 2232 4440 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 2232 wrote to memory of 4512 2232 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 4512 wrote to memory of 4320 4512 Y0X6xp55d.exe Y0X6xp55d.exe PID 3804 wrote to memory of 3676 3804 cmd.exe bie_kms.exe PID 3804 wrote to memory of 3676 3804 cmd.exe bie_kms.exe PID 3804 wrote to memory of 3676 3804 cmd.exe bie_kms.exe PID 3804 wrote to memory of 1444 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 1444 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 1444 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 2336 3804 cmd.exe PING.EXE PID 3804 wrote to memory of 2336 3804 cmd.exe PING.EXE PID 3804 wrote to memory of 2336 3804 cmd.exe PING.EXE PID 3804 wrote to memory of 2008 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 2008 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 2008 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 4200 3804 cmd.exe findstr.exe PID 3804 wrote to memory of 4200 3804 cmd.exe findstr.exe PID 3804 wrote to memory of 4200 3804 cmd.exe findstr.exe PID 3804 wrote to memory of 2460 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 2460 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 2460 3804 cmd.exe cscript.exe PID 3804 wrote to memory of 3788 3804 cmd.exe findstr.exe PID 3804 wrote to memory of 3788 3804 cmd.exe findstr.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\48bc87a9204fe25e1a18bf2640dfed61_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4592 -
C:\Users\Admin\AppData\Local\Temp\bie_7install86.exe"C:\Users\Admin\AppData\Local\Temp\bie_7install86.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\RarSFX0\start.bat" "4⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ipk 33PXH-7Y6KF-2VJC9-XBBR8-HVTHH5⤵PID:3416
-
-
C:\Users\Admin\AppData\Local\Temp\RarSFX0\bie_kms.exeC:\Users\Admin\AppData\Local\Temp\RarSFX0\bie_kms.exe5⤵
- Executes dropped EXE
PID:3676
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /skms 127.0.0.15⤵PID:1444
-
-
C:\Windows\SysWOW64\PING.EXEping -n 16 localhost5⤵
- Runs ping.exe
PID:2336
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2008
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4200
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2460
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3788
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4540
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2248
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1908
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4068
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4304
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:5008
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2216
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4460
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:3672
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2532
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4376
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2648
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1840
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2944
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:3224
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:372
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4860
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:684
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1944
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1748
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1744
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1016
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2340
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1536
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1416
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4904
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4032
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:5116
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2804
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2828
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:436
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3272
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4492
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:512
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:228
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4256
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1332
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3104
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2476
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3604
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:5108
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1496
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2036
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3740
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1488
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3488
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4036
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4480
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2648
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2752
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1540
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1740
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1468
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4976
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1548
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1688
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2760
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3828
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:448
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4124
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:5064
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4768
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2144
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1652
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:3204
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:1512
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:1528
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:2932
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:5112
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4836
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4184
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:3552
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:4516
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:4968
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:244
-
-
C:\Windows\SysWOW64\findstr.exefindstr "8007000D" C:\Windows\check.txt5⤵PID:696
-
-
C:\Windows\SysWOW64\cscript.execscript C:\Windows\system32\slmgr.vbs /ato5⤵PID:2728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"4⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\Y0X6xp55d.exe/scomma "C:\Users\Admin\AppData\Local\Temp\tmp.ini"6⤵
- Executes dropped EXE
PID:4320
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD5f4d6c55c7b137a1d8c16430287aedf40
SHA145d9902691fbcc295739764b96081b2a508311b7
SHA2568a4286546d14e1edb583278ef4226ee6542515b55a258bbfbce6d303a090c8a7
SHA5129f2e91a291ce4057fc67c4e91aaa7a9e696ce67cecec46e12372356e0b696dcfac56c6003d2c8bd897479603b8ba02aae9045399fe9648cfb838506a692d9d83
-
Filesize
939B
MD52416c7a0bb675b13a82db797a0a0f4cb
SHA1ba7d6df4cdb8801cc4f43eaed7e77f528bd6a917
SHA2565a2a2d0b9c642abeff0bce8cfa9b5e0432f56069f8366b30bca56b2b5fe7c0fb
SHA5124238b21d5aff13c02e5cf5c981983e2071b1543a96bb07a15b8f59fa2575652f9d3338e9ffa93a5bece1bc0f3e050acacceac5a141671f8522f8bbc98687e519
-
Filesize
488KB
MD589c6bf05f4d149d84822e906c29723e5
SHA1a7b1df099f236a66b2e521e37821e185d2c1ba37
SHA2563d45fde0386fcc7e82a8e799a64864c6deb4ebd33a716b54f851b566968c5050
SHA51277620db2d71edb2279d84bb685bd13d67451bb14da19017a86b25cf2b79ecd5df54357cacc4a07b278c67c0d2c35164bd9e93e1107dca176694803f9667eb606
-
Filesize
161KB
MD559d2756095c2911453dd2bfc19732108
SHA150dc150e4590f68245560670016087f125135c1a
SHA2567b8d6ed119c2d6af805e4a5276bd4df476e2632abc04070f1ac01eae3bc7478c
SHA512d0f676b381befab2fa0d94e374006f4316b0a523f603be99872a392030affd0b7d9c3c4a8c5896b3cfdf12292d11fb7d0e04f65c0b9e7fcffeb9d8707fb70693
-
Filesize
5B
MD5d1ea279fb5559c020a1b4137dc4de237
SHA1db6f8988af46b56216a6f0daf95ab8c9bdb57400
SHA256fcdcc2c46896915a1c695d6231f0fee336a668531b7a3da46178c80362546dba
SHA512720e9c284f0559015312df7fe977563e5e16f48d3506e51eb4016adf7971924d352f740b030aa3adc81b6f65fd1dba12df06d10fa6c115074e5097e7ee0f08b3
-
Filesize
257B
MD51ed51c6aa96e4d3c1cb096663cac9377
SHA1529b1a20a046fe8d5c9f0016a21f5608f40e6896
SHA2561829e00aeda812ee6f82973728bc86874c23fc2919685cb6d3f73456882ff718
SHA512a3fafc73739fd3da069076dce97a700a27783e51dd520853ecb7af0dcd337d22eb1424e128500f47964ffb3a04e03e630854748d2a6f58cb7e1ef6da0a064af1