Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 20:59
Static task
static1
Behavioral task
behavioral1
Sample
4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe
-
Size
460KB
-
MD5
4b5f78d430e873b24300a0bffb7b4f76
-
SHA1
973fdab054feb795dce8067175995f5233f65a75
-
SHA256
1892636cd11cab95f338214371c740d7fa677ad9810818ea5902fdca9b4336d6
-
SHA512
104fba41ddd5ba313147ff12ef7ae8c1568721037ff85f9ec8dcf9df43bb526ca1bd559264c1b8fb8b555a10b93ab3b87985217636b508dccca3a96f95c7f364
-
SSDEEP
12288:DlSt6oIHNOhU5O5TYo4XqTig5GSR9CClDDL:DlSt69HNx6T/5xT
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" neomu.exe Set value (int) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" iBdqphzke5.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation iBdqphzke5.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe -
Executes dropped EXE 6 IoCs
pid Process 628 iBdqphzke5.exe 2424 astat.exe 1944 neomu.exe 1188 astat.exe 736 dstat.exe 5088 fstat.exe -
resource yara_rule behavioral2/memory/1188-50-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1188-51-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1188-53-0x0000000000400000-0x000000000040E000-memory.dmp upx behavioral2/memory/1188-47-0x0000000000400000-0x000000000040E000-memory.dmp upx -
Adds Run key to start application 2 TTPs 53 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /u" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /X" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /V" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /l" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /G" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /A" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /Z" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /p" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /y" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /U" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /h" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /E" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /s" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /a" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /t" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /z" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /M" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /m" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /C" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /e" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /S" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /n" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /P" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /v" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /Y" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /i" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /k" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /B" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /s" iBdqphzke5.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /J" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /w" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /R" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /g" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /K" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /r" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /d" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /f" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /q" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /j" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /o" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /O" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /D" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /L" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /W" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /N" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /T" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /Q" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /I" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /x" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /c" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /b" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /H" neomu.exe Set value (str) \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\neomu = "C:\\Users\\Admin\\neomu.exe /F" neomu.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2424 set thread context of 1188 2424 astat.exe 93 PID 5088 set thread context of 672 5088 fstat.exe 101 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Enumerates processes with tasklist 1 TTPs 2 IoCs
pid Process 4520 tasklist.exe 3148 tasklist.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 628 iBdqphzke5.exe 628 iBdqphzke5.exe 628 iBdqphzke5.exe 628 iBdqphzke5.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1188 astat.exe 1188 astat.exe 1188 astat.exe 1188 astat.exe 1188 astat.exe 1188 astat.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe 1944 neomu.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3148 tasklist.exe Token: SeDebugPrivilege 5088 fstat.exe Token: SeDebugPrivilege 4520 tasklist.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 628 iBdqphzke5.exe 1944 neomu.exe 2424 astat.exe 736 dstat.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3168 wrote to memory of 628 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 87 PID 3168 wrote to memory of 628 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 87 PID 3168 wrote to memory of 628 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 87 PID 628 wrote to memory of 1944 628 iBdqphzke5.exe 89 PID 628 wrote to memory of 1944 628 iBdqphzke5.exe 89 PID 628 wrote to memory of 1944 628 iBdqphzke5.exe 89 PID 3168 wrote to memory of 2424 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 90 PID 3168 wrote to memory of 2424 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 90 PID 3168 wrote to memory of 2424 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 90 PID 628 wrote to memory of 1480 628 iBdqphzke5.exe 91 PID 628 wrote to memory of 1480 628 iBdqphzke5.exe 91 PID 628 wrote to memory of 1480 628 iBdqphzke5.exe 91 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 2424 wrote to memory of 1188 2424 astat.exe 93 PID 1480 wrote to memory of 3148 1480 cmd.exe 94 PID 1480 wrote to memory of 3148 1480 cmd.exe 94 PID 1480 wrote to memory of 3148 1480 cmd.exe 94 PID 3168 wrote to memory of 736 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 96 PID 3168 wrote to memory of 736 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 96 PID 3168 wrote to memory of 736 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 96 PID 3168 wrote to memory of 5088 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 100 PID 3168 wrote to memory of 5088 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 100 PID 3168 wrote to memory of 5088 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 100 PID 5088 wrote to memory of 672 5088 fstat.exe 101 PID 5088 wrote to memory of 672 5088 fstat.exe 101 PID 5088 wrote to memory of 672 5088 fstat.exe 101 PID 5088 wrote to memory of 672 5088 fstat.exe 101 PID 3168 wrote to memory of 2592 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 103 PID 3168 wrote to memory of 2592 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 103 PID 3168 wrote to memory of 2592 3168 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe 103 PID 2592 wrote to memory of 4520 2592 cmd.exe 105 PID 2592 wrote to memory of 4520 2592 cmd.exe 105 PID 2592 wrote to memory of 4520 2592 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3168 -
C:\Users\Admin\iBdqphzke5.exeC:\Users\Admin\iBdqphzke5.exe2⤵
- Modifies visiblity of hidden/system files in Explorer
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Users\Admin\neomu.exe"C:\Users\Admin\neomu.exe"3⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1944
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del iBdqphzke5.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\tasklist.exetasklist4⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:3148
-
-
-
-
C:\Users\Admin\astat.exeC:\Users\Admin\astat.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2424 -
C:\Users\Admin\astat.exe"C:\Users\Admin\astat.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1188
-
-
-
C:\Users\Admin\dstat.exeC:\Users\Admin\dstat.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:736
-
-
C:\Users\Admin\fstat.exeC:\Users\Admin\fstat.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe"3⤵PID:672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c tasklist&&del 4b5f78d430e873b24300a0bffb7b4f76_JaffaCakes118.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\tasklist.exetasklist3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:4520
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60KB
MD587c6498966e3f85fac743c89050aa312
SHA105c165c34cbfa14e4925c33ace81992b0f50a2b5
SHA25630c8328585e41968aff773da16cedbe590dcefd293c7fa74a69c557ecbf2c3c5
SHA512740f7159ee78f73e57c92e583b8c4f97c5dd49b68b9c321da976d7e318819daa28e8dfc76e95e1e3ccee643dc464324c40b481d1849863e287d826adb577b420
-
Filesize
36KB
MD5b6da847084e39e0cecf175c32c91b4bb
SHA1fbfd9494fabed5220cdf01866ff088fe7adc535b
SHA256065781e8a55cf59cb926d5950e0039e19b50b1e081023404fbff4d7a32fc9cbe
SHA51259d372ea36904cd48c99f2f34740c22004b35c5e5dada2417813b0463292af19e4aa5ba4552cc443da373e40ba03a1f7906019a567806806f5972c202a31d9d2
-
Filesize
271KB
MD534353cf7e1d1b10bcbbcae0745110535
SHA12fb471681daac6f6d66477b7772025da4f58c508
SHA256b2d7a66e2d10d8943e48d6f3ad75237ff379e82ab0101a620406c4569be1d959
SHA5127404f82abfabd21d6f2a88b55f6f0ff886bb0a1f16a9d45c6883d74daa26451f862a10a78646c549c3a3264ba4bd9fb44949d470493af895973dd05a0ec311e6
-
Filesize
244KB
MD5a4cdb62cf4866a17e742e7e9cc73d237
SHA130d94f8e872455ac569949ac4c768d0a0cdfbba7
SHA256c741d649bf5b72fbe97470820ce994ce29b153baae14af10c3a2a9adc3098b32
SHA512c4447f95565d3e5dc0ef7712382325280bedf127ac682f85f4043b586afb4188633f2c73277595eb31fe45d992107492f42c82a71f448286a9cb8fac4bfb3671
-
Filesize
244KB
MD5c9d10ae6b738fe3e4527724c9e767a00
SHA119bc25b863fe76fc937868661b6dd607b719b82f
SHA256590762806cafda76921504693f1758c4d552a53273b095aa8ecdafe01198e699
SHA512b3a97205619ee7e8e13451aef23cc948849506a35cf79b8b696dc8be54ba2911b666c8dec6ee1d73648bc404768900835032b2809926c7b88beffbfd46ff4bbc