Analysis

  • max time kernel
    147s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    20/07/2024, 06:44

General

  • Target

    5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe

  • Size

    460KB

  • MD5

    5f6ca2ee775e28b9e8316c4ee58eb475

  • SHA1

    887451ca33fa71761595fd4e25eeb62b082c5697

  • SHA256

    2add25b7cdc30501f0622fe846e3e66043cbd0448697cb7b3ff76601303f9e6d

  • SHA512

    7c83aa4172e303e65febe419969a6d3663abc11c94a8fdaefa593a7c3fe415c5bb82fe836eac4098fa1bf886e2625c2b840cacb2107ddc1a13876188fd2ca195

  • SSDEEP

    12288:gWPG+rYoPyM3kdueD7u6rOGif9x1N3R1TTEeBt:XG+rYSIu2u6ri9LN3/PEen

Score
8/10

Malware Config

Signatures

  • Boot or Logon Autostart Execution: Active Setup 2 TTPs 50 IoCs

    Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 24 IoCs
  • UPX packed file 9 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 64 IoCs
  • Suspicious use of SetThreadContext 48 IoCs
  • Drops file in Windows directory 48 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of SetWindowsHookEx 48 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1840
    • C:\Users\Admin\AppData\Local\Temp\5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe
      "C:\Users\Admin\AppData\Local\Temp\5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1644
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe"
        3⤵
          PID:236
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe"
          3⤵
            PID:1648
          • C:\Users\Admin\AppData\Local\Temp\5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe
            C:\Users\Admin\AppData\Local\Temp\5f6ca2ee775e28b9e8316c4ee58eb475_JaffaCakes118.exe
            3⤵
            • Boot or Logon Autostart Execution: Active Setup
            • Adds Run key to start application
            • Drops file in Windows directory
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Windows\SysWOW64\svchost.exe
              svchost.exe
              4⤵
              • Boot or Logon Autostart Execution: Active Setup
              • Loads dropped DLL
              • Adds Run key to start application
              • Suspicious use of WriteProcessMemory
              PID:2932
              • C:\Windows\InstallDir\Server.exe
                "C:\Windows\InstallDir\Server.exe"
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Drops file in Windows directory
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2696
                • C:\Windows\InstallDir\Server.exe
                  "C:\Windows\InstallDir\Server.exe"
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:2760
                  • C:\Program Files\Internet Explorer\iexplore.exe
                    "C:\Program Files\Internet Explorer\iexplore.exe"
                    7⤵
                      PID:1940
                    • C:\Program Files\Internet Explorer\iexplore.exe
                      "C:\Program Files\Internet Explorer\iexplore.exe"
                      7⤵
                        PID:3040
                      • C:\Windows\InstallDir\Server.exe
                        C:\Windows\InstallDir\Server.exe
                        7⤵
                        • Boot or Logon Autostart Execution: Active Setup
                        • Executes dropped EXE
                        • Adds Run key to start application
                        • Drops file in Windows directory
                        • Suspicious use of SetWindowsHookEx
                        PID:1448
                  • C:\Windows\InstallDir\Server.exe
                    "C:\Windows\InstallDir\Server.exe"
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Drops file in Windows directory
                    • Suspicious use of SetWindowsHookEx
                    PID:2432
                    • C:\Windows\InstallDir\Server.exe
                      "C:\Windows\InstallDir\Server.exe"
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetThreadContext
                      • Suspicious behavior: EnumeratesProcesses
                      PID:1296
                      • C:\Program Files\Internet Explorer\iexplore.exe
                        "C:\Program Files\Internet Explorer\iexplore.exe"
                        7⤵
                          PID:1600
                        • C:\Program Files\Internet Explorer\iexplore.exe
                          "C:\Program Files\Internet Explorer\iexplore.exe"
                          7⤵
                            PID:1872
                          • C:\Windows\InstallDir\Server.exe
                            C:\Windows\InstallDir\Server.exe
                            7⤵
                            • Boot or Logon Autostart Execution: Active Setup
                            • Executes dropped EXE
                            • Adds Run key to start application
                            • Drops file in Windows directory
                            • Suspicious use of SetWindowsHookEx
                            PID:2352
                      • C:\Windows\InstallDir\Server.exe
                        "C:\Windows\InstallDir\Server.exe"
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetThreadContext
                        • Drops file in Windows directory
                        • Suspicious use of SetWindowsHookEx
                        PID:2908
                        • C:\Windows\InstallDir\Server.exe
                          "C:\Windows\InstallDir\Server.exe"
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious behavior: EnumeratesProcesses
                          PID:2624
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe"
                            7⤵
                              PID:1516
                            • C:\Program Files\Internet Explorer\iexplore.exe
                              "C:\Program Files\Internet Explorer\iexplore.exe"
                              7⤵
                                PID:1856
                              • C:\Windows\InstallDir\Server.exe
                                C:\Windows\InstallDir\Server.exe
                                7⤵
                                • Boot or Logon Autostart Execution: Active Setup
                                • Executes dropped EXE
                                • Adds Run key to start application
                                • Drops file in Windows directory
                                • Suspicious use of SetWindowsHookEx
                                PID:964
                          • C:\Windows\InstallDir\Server.exe
                            "C:\Windows\InstallDir\Server.exe"
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Drops file in Windows directory
                            • Suspicious use of SetWindowsHookEx
                            PID:316
                            • C:\Windows\InstallDir\Server.exe
                              "C:\Windows\InstallDir\Server.exe"
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: EnumeratesProcesses
                              PID:1700
                              • C:\Program Files\Internet Explorer\iexplore.exe
                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                7⤵
                                  PID:956
                                • C:\Program Files\Internet Explorer\iexplore.exe
                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                  7⤵
                                    PID:2304
                                  • C:\Windows\InstallDir\Server.exe
                                    C:\Windows\InstallDir\Server.exe
                                    7⤵
                                    • Boot or Logon Autostart Execution: Active Setup
                                    • Executes dropped EXE
                                    • Adds Run key to start application
                                    • Drops file in Windows directory
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1352
                              • C:\Windows\InstallDir\Server.exe
                                "C:\Windows\InstallDir\Server.exe"
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetThreadContext
                                • Drops file in Windows directory
                                • Suspicious use of SetWindowsHookEx
                                PID:2396
                                • C:\Windows\InstallDir\Server.exe
                                  "C:\Windows\InstallDir\Server.exe"
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetThreadContext
                                  • Suspicious behavior: EnumeratesProcesses
                                  PID:112
                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                    7⤵
                                      PID:2972
                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                      7⤵
                                        PID:2284
                                      • C:\Windows\InstallDir\Server.exe
                                        C:\Windows\InstallDir\Server.exe
                                        7⤵
                                        • Boot or Logon Autostart Execution: Active Setup
                                        • Executes dropped EXE
                                        • Adds Run key to start application
                                        • Drops file in Windows directory
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2428
                                  • C:\Windows\InstallDir\Server.exe
                                    "C:\Windows\InstallDir\Server.exe"
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetThreadContext
                                    • Drops file in Windows directory
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2440
                                    • C:\Windows\InstallDir\Server.exe
                                      "C:\Windows\InstallDir\Server.exe"
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Suspicious behavior: EnumeratesProcesses
                                      PID:532
                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                        7⤵
                                          PID:2092
                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                          7⤵
                                            PID:2672
                                          • C:\Windows\InstallDir\Server.exe
                                            C:\Windows\InstallDir\Server.exe
                                            7⤵
                                            • Boot or Logon Autostart Execution: Active Setup
                                            • Executes dropped EXE
                                            • Adds Run key to start application
                                            • Drops file in Windows directory
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2768
                                      • C:\Windows\InstallDir\Server.exe
                                        "C:\Windows\InstallDir\Server.exe"
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Drops file in Windows directory
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2580
                                        • C:\Windows\InstallDir\Server.exe
                                          "C:\Windows\InstallDir\Server.exe"
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetThreadContext
                                          • Suspicious behavior: EnumeratesProcesses
                                          PID:2592
                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                            7⤵
                                              PID:1808
                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                              7⤵
                                                PID:2008
                                              • C:\Windows\InstallDir\Server.exe
                                                C:\Windows\InstallDir\Server.exe
                                                7⤵
                                                • Boot or Logon Autostart Execution: Active Setup
                                                • Executes dropped EXE
                                                • Adds Run key to start application
                                                • Drops file in Windows directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1708
                                          • C:\Windows\InstallDir\Server.exe
                                            "C:\Windows\InstallDir\Server.exe"
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetThreadContext
                                            • Drops file in Windows directory
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2588
                                            • C:\Windows\InstallDir\Server.exe
                                              "C:\Windows\InstallDir\Server.exe"
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetThreadContext
                                              • Suspicious behavior: EnumeratesProcesses
                                              PID:832
                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                7⤵
                                                  PID:1016
                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                  7⤵
                                                    PID:1320
                                                  • C:\Windows\InstallDir\Server.exe
                                                    C:\Windows\InstallDir\Server.exe
                                                    7⤵
                                                    • Boot or Logon Autostart Execution: Active Setup
                                                    • Executes dropped EXE
                                                    • Adds Run key to start application
                                                    • Drops file in Windows directory
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1664
                                              • C:\Windows\InstallDir\Server.exe
                                                "C:\Windows\InstallDir\Server.exe"
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetThreadContext
                                                • Drops file in Windows directory
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2376
                                                • C:\Windows\InstallDir\Server.exe
                                                  "C:\Windows\InstallDir\Server.exe"
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetThreadContext
                                                  • Suspicious behavior: EnumeratesProcesses
                                                  PID:2216
                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                    7⤵
                                                      PID:2900
                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                      7⤵
                                                        PID:1368
                                                      • C:\Windows\InstallDir\Server.exe
                                                        C:\Windows\InstallDir\Server.exe
                                                        7⤵
                                                        • Boot or Logon Autostart Execution: Active Setup
                                                        • Executes dropped EXE
                                                        • Adds Run key to start application
                                                        • Drops file in Windows directory
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1344
                                                  • C:\Windows\InstallDir\Server.exe
                                                    "C:\Windows\InstallDir\Server.exe"
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetThreadContext
                                                    • Drops file in Windows directory
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1668
                                                    • C:\Windows\InstallDir\Server.exe
                                                      "C:\Windows\InstallDir\Server.exe"
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetThreadContext
                                                      • Suspicious behavior: EnumeratesProcesses
                                                      PID:1532
                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                        7⤵
                                                          PID:2188
                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                                          7⤵
                                                            PID:2936
                                                          • C:\Windows\InstallDir\Server.exe
                                                            C:\Windows\InstallDir\Server.exe
                                                            7⤵
                                                            • Boot or Logon Autostart Execution: Active Setup
                                                            • Executes dropped EXE
                                                            • Adds Run key to start application
                                                            • Drops file in Windows directory
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1848
                                                      • C:\Windows\InstallDir\Server.exe
                                                        "C:\Windows\InstallDir\Server.exe"
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetThreadContext
                                                        • Drops file in Windows directory
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1760
                                                        • C:\Windows\InstallDir\Server.exe
                                                          "C:\Windows\InstallDir\Server.exe"
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetThreadContext
                                                          • Suspicious behavior: EnumeratesProcesses
                                                          PID:1632
                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                                            7⤵
                                                              PID:2428
                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                              7⤵
                                                                PID:476
                                                              • C:\Windows\InstallDir\Server.exe
                                                                C:\Windows\InstallDir\Server.exe
                                                                7⤵
                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                • Executes dropped EXE
                                                                • Adds Run key to start application
                                                                • Drops file in Windows directory
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2500
                                                          • C:\Windows\InstallDir\Server.exe
                                                            "C:\Windows\InstallDir\Server.exe"
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetThreadContext
                                                            • Drops file in Windows directory
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2620
                                                            • C:\Windows\InstallDir\Server.exe
                                                              "C:\Windows\InstallDir\Server.exe"
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetThreadContext
                                                              • Suspicious behavior: EnumeratesProcesses
                                                              PID:2632
                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                7⤵
                                                                  PID:2540
                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                  7⤵
                                                                    PID:2524
                                                                  • C:\Windows\InstallDir\Server.exe
                                                                    C:\Windows\InstallDir\Server.exe
                                                                    7⤵
                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                    • Executes dropped EXE
                                                                    • Adds Run key to start application
                                                                    • Drops file in Windows directory
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2604
                                                              • C:\Windows\InstallDir\Server.exe
                                                                "C:\Windows\InstallDir\Server.exe"
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetThreadContext
                                                                • Drops file in Windows directory
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2824
                                                                • C:\Windows\InstallDir\Server.exe
                                                                  "C:\Windows\InstallDir\Server.exe"
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetThreadContext
                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                  PID:1448
                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                    7⤵
                                                                      PID:2104
                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                      7⤵
                                                                        PID:1340
                                                                      • C:\Windows\InstallDir\Server.exe
                                                                        C:\Windows\InstallDir\Server.exe
                                                                        7⤵
                                                                        • Boot or Logon Autostart Execution: Active Setup
                                                                        • Executes dropped EXE
                                                                        • Adds Run key to start application
                                                                        • Drops file in Windows directory
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2360
                                                                  • C:\Windows\InstallDir\Server.exe
                                                                    "C:\Windows\InstallDir\Server.exe"
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetThreadContext
                                                                    • Drops file in Windows directory
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2876
                                                                    • C:\Windows\InstallDir\Server.exe
                                                                      "C:\Windows\InstallDir\Server.exe"
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetThreadContext
                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                      PID:1336
                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                        7⤵
                                                                          PID:2424
                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                          7⤵
                                                                            PID:1616
                                                                          • C:\Windows\InstallDir\Server.exe
                                                                            C:\Windows\InstallDir\Server.exe
                                                                            7⤵
                                                                            • Boot or Logon Autostart Execution: Active Setup
                                                                            • Executes dropped EXE
                                                                            • Adds Run key to start application
                                                                            • Drops file in Windows directory
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2200
                                                                      • C:\Windows\InstallDir\Server.exe
                                                                        "C:\Windows\InstallDir\Server.exe"
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetThreadContext
                                                                        • Drops file in Windows directory
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2952
                                                                        • C:\Windows\InstallDir\Server.exe
                                                                          "C:\Windows\InstallDir\Server.exe"
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetThreadContext
                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                          PID:2376
                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                            7⤵
                                                                              PID:692
                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                              7⤵
                                                                                PID:616
                                                                              • C:\Windows\InstallDir\Server.exe
                                                                                C:\Windows\InstallDir\Server.exe
                                                                                7⤵
                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                • Executes dropped EXE
                                                                                • Adds Run key to start application
                                                                                • Drops file in Windows directory
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:948
                                                                          • C:\Windows\InstallDir\Server.exe
                                                                            "C:\Windows\InstallDir\Server.exe"
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetThreadContext
                                                                            • Drops file in Windows directory
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1836
                                                                            • C:\Windows\InstallDir\Server.exe
                                                                              "C:\Windows\InstallDir\Server.exe"
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetThreadContext
                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                              PID:1624
                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                7⤵
                                                                                  PID:844
                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                  7⤵
                                                                                    PID:1788
                                                                                  • C:\Windows\InstallDir\Server.exe
                                                                                    C:\Windows\InstallDir\Server.exe
                                                                                    7⤵
                                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                                    • Executes dropped EXE
                                                                                    • Adds Run key to start application
                                                                                    • Drops file in Windows directory
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:320
                                                                              • C:\Windows\InstallDir\Server.exe
                                                                                "C:\Windows\InstallDir\Server.exe"
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetThreadContext
                                                                                • Drops file in Windows directory
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1596
                                                                                • C:\Windows\InstallDir\Server.exe
                                                                                  "C:\Windows\InstallDir\Server.exe"
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetThreadContext
                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                  PID:1564
                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                    7⤵
                                                                                      PID:1956
                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                      7⤵
                                                                                        PID:2372
                                                                                      • C:\Windows\InstallDir\Server.exe
                                                                                        C:\Windows\InstallDir\Server.exe
                                                                                        7⤵
                                                                                        • Boot or Logon Autostart Execution: Active Setup
                                                                                        • Executes dropped EXE
                                                                                        • Adds Run key to start application
                                                                                        • Drops file in Windows directory
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2732
                                                                                  • C:\Windows\InstallDir\Server.exe
                                                                                    "C:\Windows\InstallDir\Server.exe"
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetThreadContext
                                                                                    • Drops file in Windows directory
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2656
                                                                                    • C:\Windows\InstallDir\Server.exe
                                                                                      "C:\Windows\InstallDir\Server.exe"
                                                                                      6⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetThreadContext
                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                      PID:2436
                                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                        7⤵
                                                                                          PID:1996
                                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                          7⤵
                                                                                            PID:2564
                                                                                          • C:\Windows\InstallDir\Server.exe
                                                                                            C:\Windows\InstallDir\Server.exe
                                                                                            7⤵
                                                                                            • Boot or Logon Autostart Execution: Active Setup
                                                                                            • Executes dropped EXE
                                                                                            • Adds Run key to start application
                                                                                            • Drops file in Windows directory
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1480
                                                                                      • C:\Windows\InstallDir\Server.exe
                                                                                        "C:\Windows\InstallDir\Server.exe"
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetThreadContext
                                                                                        • Drops file in Windows directory
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:848
                                                                                        • C:\Windows\InstallDir\Server.exe
                                                                                          "C:\Windows\InstallDir\Server.exe"
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetThreadContext
                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                          PID:2856
                                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                            7⤵
                                                                                              PID:1964
                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                              7⤵
                                                                                                PID:2596
                                                                                              • C:\Windows\InstallDir\Server.exe
                                                                                                C:\Windows\InstallDir\Server.exe
                                                                                                7⤵
                                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                                • Executes dropped EXE
                                                                                                • Drops file in Windows directory
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1984
                                                                                          • C:\Windows\InstallDir\Server.exe
                                                                                            "C:\Windows\InstallDir\Server.exe"
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetThreadContext
                                                                                            • Drops file in Windows directory
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:2388
                                                                                            • C:\Windows\InstallDir\Server.exe
                                                                                              "C:\Windows\InstallDir\Server.exe"
                                                                                              6⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetThreadContext
                                                                                              • Suspicious behavior: EnumeratesProcesses
                                                                                              PID:2884
                                                                                              • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                7⤵
                                                                                                  PID:2380
                                                                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                  "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                  7⤵
                                                                                                    PID:2860
                                                                                                  • C:\Windows\InstallDir\Server.exe
                                                                                                    C:\Windows\InstallDir\Server.exe
                                                                                                    7⤵
                                                                                                    • Boot or Logon Autostart Execution: Active Setup
                                                                                                    • Executes dropped EXE
                                                                                                    • Adds Run key to start application
                                                                                                    • Drops file in Windows directory
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2948
                                                                                              • C:\Windows\InstallDir\Server.exe
                                                                                                "C:\Windows\InstallDir\Server.exe"
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetThreadContext
                                                                                                • Drops file in Windows directory
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1676
                                                                                                • C:\Windows\InstallDir\Server.exe
                                                                                                  "C:\Windows\InstallDir\Server.exe"
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetThreadContext
                                                                                                  • Suspicious behavior: EnumeratesProcesses
                                                                                                  PID:636
                                                                                                  • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                    "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                    7⤵
                                                                                                      PID:1656
                                                                                                    • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                      "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                      7⤵
                                                                                                        PID:1544
                                                                                                      • C:\Windows\InstallDir\Server.exe
                                                                                                        C:\Windows\InstallDir\Server.exe
                                                                                                        7⤵
                                                                                                        • Boot or Logon Autostart Execution: Active Setup
                                                                                                        • Executes dropped EXE
                                                                                                        • Adds Run key to start application
                                                                                                        • Drops file in Windows directory
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2404
                                                                                                  • C:\Windows\InstallDir\Server.exe
                                                                                                    "C:\Windows\InstallDir\Server.exe"
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetThreadContext
                                                                                                    • Drops file in Windows directory
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:564
                                                                                                    • C:\Windows\InstallDir\Server.exe
                                                                                                      "C:\Windows\InstallDir\Server.exe"
                                                                                                      6⤵
                                                                                                      • Suspicious use of SetThreadContext
                                                                                                      • Suspicious behavior: EnumeratesProcesses
                                                                                                      PID:1836
                                                                                                      • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                        "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                        7⤵
                                                                                                          PID:2396
                                                                                                        • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                          "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                          7⤵
                                                                                                            PID:904
                                                                                                          • C:\Windows\InstallDir\Server.exe
                                                                                                            C:\Windows\InstallDir\Server.exe
                                                                                                            7⤵
                                                                                                            • Boot or Logon Autostart Execution: Active Setup
                                                                                                            • Adds Run key to start application
                                                                                                            • Drops file in Windows directory
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:2240
                                                                                                      • C:\Windows\InstallDir\Server.exe
                                                                                                        "C:\Windows\InstallDir\Server.exe"
                                                                                                        5⤵
                                                                                                        • Suspicious use of SetThreadContext
                                                                                                        • Drops file in Windows directory
                                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                                        PID:2680
                                                                                                        • C:\Windows\InstallDir\Server.exe
                                                                                                          "C:\Windows\InstallDir\Server.exe"
                                                                                                          6⤵
                                                                                                          • Suspicious use of SetThreadContext
                                                                                                          • Suspicious behavior: EnumeratesProcesses
                                                                                                          PID:1592
                                                                                                          • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                            "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                            7⤵
                                                                                                              PID:2732
                                                                                                            • C:\Program Files\Internet Explorer\iexplore.exe
                                                                                                              "C:\Program Files\Internet Explorer\iexplore.exe"
                                                                                                              7⤵
                                                                                                                PID:2560
                                                                                                              • C:\Windows\InstallDir\Server.exe
                                                                                                                C:\Windows\InstallDir\Server.exe
                                                                                                                7⤵
                                                                                                                • Boot or Logon Autostart Execution: Active Setup
                                                                                                                • Adds Run key to start application
                                                                                                                • Drops file in Windows directory
                                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                                PID:2816

                                                                                                  Network

                                                                                                  MITRE ATT&CK Enterprise v15

                                                                                                  Replay Monitor

                                                                                                  Loading Replay Monitor...

                                                                                                  Downloads

                                                                                                  • C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe

                                                                                                    Filesize

                                                                                                    460KB

                                                                                                    MD5

                                                                                                    07f4b03490fbbfcd46096d638a18300f

                                                                                                    SHA1

                                                                                                    43b988128722c01f3d5de2980a704309b9e468b3

                                                                                                    SHA256

                                                                                                    9f43f97ed8cc5cc315f9b691f9424c159e73913395695bd3390694600b27fca3

                                                                                                    SHA512

                                                                                                    fe4fa701e4f1eabe927adea70e484a7b8e53d2560810e3fa4e990bf9a5c31b3fae03412df153383bce3374778e36ffbb42f274626c0cd5593027fd46085e63b4

                                                                                                  • C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe

                                                                                                    Filesize

                                                                                                    460KB

                                                                                                    MD5

                                                                                                    f5dc5bb5e972401e9897eab7dce1be4b

                                                                                                    SHA1

                                                                                                    5ac8bbd048c0ea5763fd08cafabb19cd4c34537e

                                                                                                    SHA256

                                                                                                    28f061790401c855822e1a00c8e03f5e5689d847f149dadac0235c20554eba70

                                                                                                    SHA512

                                                                                                    e07938050896496a1c28585fd53fe7132a62b65632777d1c45c40bfd75896bce49254bebc0a752465ba4f73ddb00729a22e569b863ef1a39e20e66b79eb51694

                                                                                                  • C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe

                                                                                                    Filesize

                                                                                                    460KB

                                                                                                    MD5

                                                                                                    27ea21f0b09d23bb0126b3933f703003

                                                                                                    SHA1

                                                                                                    c52df24d660e26efdcb91066a4e67d2d9aea91e8

                                                                                                    SHA256

                                                                                                    28d12a089efab2f0bf3de7daeca85fe00c3fa9919b0a42b633dbb9c778a7b81e

                                                                                                    SHA512

                                                                                                    c7cc5638fb8fab37563d0b57eaeba2ddf8a34f81fb3b40deca69fa9519bcb66f8d6f6ba143694b555937ceba323d706283da830f3dc1399ed55cb2997c1000a7

                                                                                                  • C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3450744190-3404161390-554719085-1000\88603cb2913a7df3fbd16b5f958e6447_35dd7637-4d7c-4a57-bd86-689f7bd65008

                                                                                                    Filesize

                                                                                                    51B

                                                                                                    MD5

                                                                                                    5fc2ac2a310f49c14d195230b91a8885

                                                                                                    SHA1

                                                                                                    90855cc11136ba31758fe33b5cf9571f9a104879

                                                                                                    SHA256

                                                                                                    374e0e2897a7a82e0e44794cad89df0f3cdd7703886239c1fe06d625efd48092

                                                                                                    SHA512

                                                                                                    ab46554df9174b9fe9beba50a640f67534c3812f64d96a1fb8adfdc136dfe730ca2370825cd45b7f87a544d6a58dd868cb5a3a7f42e2789f6d679dbc0fdd52c3

                                                                                                  • C:\Windows\InstallDir\Server.exe

                                                                                                    Filesize

                                                                                                    460KB

                                                                                                    MD5

                                                                                                    5f6ca2ee775e28b9e8316c4ee58eb475

                                                                                                    SHA1

                                                                                                    887451ca33fa71761595fd4e25eeb62b082c5697

                                                                                                    SHA256

                                                                                                    2add25b7cdc30501f0622fe846e3e66043cbd0448697cb7b3ff76601303f9e6d

                                                                                                    SHA512

                                                                                                    7c83aa4172e303e65febe419969a6d3663abc11c94a8fdaefa593a7c3fe415c5bb82fe836eac4098fa1bf886e2625c2b840cacb2107ddc1a13876188fd2ca195

                                                                                                  • memory/1644-10-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-8-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-14-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-18-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-22-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-20-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                                                    Filesize

                                                                                                    4KB

                                                                                                  • memory/1644-6-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-16-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-23-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-4-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-37-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-25-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-24-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/1644-12-0x0000000000400000-0x0000000000466000-memory.dmp

                                                                                                    Filesize

                                                                                                    408KB

                                                                                                  • memory/2668-31-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-39-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-46-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-47-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-38-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-40-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-27-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-29-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2668-26-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB

                                                                                                  • memory/2932-45-0x0000000010000000-0x000000001031C000-memory.dmp

                                                                                                    Filesize

                                                                                                    3.1MB