Analysis
-
max time kernel
133s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 23:46
Static task
static1
Behavioral task
behavioral1
Sample
763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe
-
Size
608KB
-
MD5
763ef81345f2e3046e07ce3c9fc772b6
-
SHA1
e7b4ee03f99b23be9d19bcdbc13a3ea8e3b7a852
-
SHA256
f200b09ded14613804a32d367733c8e38e7c6d207a62e1c911b5ddf1e5a68545
-
SHA512
2d068e5a57d4aa232b81116c00b7e9ed33e2c6cfe8b9e37bb88666b372471dc5232cbba4bb6fee383aabdc0a05c2c5bf174ccb2875653484f886f158ede9347e
-
SSDEEP
12288:zjgVEGHSRgah8p5gkd7mNvZn479Q5bQjNDhlWM:zimRg/mv2q5bm3P
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" reg.exe -
Disables Task Manager via registry modification
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 5064 attrib.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3419463127-3903270268-2580331543-1000\Control Panel\International\Geo\Nation 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\Mozilla Firefox\mozillas.cfg 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe File created C:\Program Files (x86)\Mozilla Firefox\defaults\pref\local-settings.js 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe -
Launches sc.exe 2 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 536 sc.exe 4348 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 35 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 1 IoCs
pid Process 3956 taskkill.exe -
Runs net.exe
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3956 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3380 wrote to memory of 2496 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 87 PID 3380 wrote to memory of 2496 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 87 PID 3380 wrote to memory of 2496 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 87 PID 3380 wrote to memory of 544 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 93 PID 3380 wrote to memory of 544 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 93 PID 3380 wrote to memory of 544 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 93 PID 3380 wrote to memory of 1852 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 95 PID 3380 wrote to memory of 1852 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 95 PID 3380 wrote to memory of 1852 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 95 PID 3380 wrote to memory of 3216 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 97 PID 3380 wrote to memory of 3216 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 97 PID 3380 wrote to memory of 3216 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 97 PID 3380 wrote to memory of 4744 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 99 PID 3380 wrote to memory of 4744 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 99 PID 3380 wrote to memory of 4744 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 99 PID 3380 wrote to memory of 2028 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 101 PID 3380 wrote to memory of 2028 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 101 PID 3380 wrote to memory of 2028 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 101 PID 3380 wrote to memory of 1656 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 103 PID 3380 wrote to memory of 1656 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 103 PID 3380 wrote to memory of 1656 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 103 PID 3380 wrote to memory of 3264 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 104 PID 3380 wrote to memory of 3264 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 104 PID 3380 wrote to memory of 3264 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 104 PID 3380 wrote to memory of 2440 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 107 PID 3380 wrote to memory of 2440 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 107 PID 3380 wrote to memory of 2440 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 107 PID 3380 wrote to memory of 3820 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 108 PID 3380 wrote to memory of 3820 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 108 PID 3380 wrote to memory of 3820 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 108 PID 3380 wrote to memory of 3756 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 111 PID 3380 wrote to memory of 3756 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 111 PID 3380 wrote to memory of 3756 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 111 PID 3380 wrote to memory of 4008 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 113 PID 3380 wrote to memory of 4008 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 113 PID 3380 wrote to memory of 4008 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 113 PID 3380 wrote to memory of 4244 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 114 PID 3380 wrote to memory of 4244 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 114 PID 3380 wrote to memory of 4244 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 114 PID 3380 wrote to memory of 1272 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 116 PID 3380 wrote to memory of 1272 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 116 PID 3380 wrote to memory of 1272 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 116 PID 3380 wrote to memory of 2044 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 119 PID 3380 wrote to memory of 2044 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 119 PID 3380 wrote to memory of 2044 3380 763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe 119 PID 3216 wrote to memory of 3520 3216 cmd.exe 121 PID 3216 wrote to memory of 3520 3216 cmd.exe 121 PID 3216 wrote to memory of 3520 3216 cmd.exe 121 PID 544 wrote to memory of 5064 544 cmd.exe 122 PID 544 wrote to memory of 5064 544 cmd.exe 122 PID 544 wrote to memory of 5064 544 cmd.exe 122 PID 1852 wrote to memory of 800 1852 cmd.exe 123 PID 1852 wrote to memory of 800 1852 cmd.exe 123 PID 1852 wrote to memory of 800 1852 cmd.exe 123 PID 3520 wrote to memory of 4760 3520 net.exe 124 PID 3520 wrote to memory of 4760 3520 net.exe 124 PID 3520 wrote to memory of 4760 3520 net.exe 124 PID 2028 wrote to memory of 2660 2028 cmd.exe 125 PID 2028 wrote to memory of 2660 2028 cmd.exe 125 PID 2028 wrote to memory of 2660 2028 cmd.exe 125 PID 4744 wrote to memory of 4348 4744 cmd.exe 126 PID 4744 wrote to memory of 4348 4744 cmd.exe 126 PID 4744 wrote to memory of 4348 4744 cmd.exe 126 PID 1656 wrote to memory of 4344 1656 cmd.exe 127 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5064 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3380 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\763ef81345f2e3046e07ce3c9fc772b6_JaffaCakes118.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\shell32.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c attrib +R +S +H "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\shell32.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:544 -
C:\Windows\SysWOW64\attrib.exeattrib +R +S +H "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\shell32.exe"3⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c %windir%\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\SafeBoot" /v "AlternateShell" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\shell32.exe" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\System\CurrentControlSet\Control\SafeBoot" /v "AlternateShell" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\shell32.exe" /f3⤵
- System Location Discovery: System Language Discovery
PID:800
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3216 -
C:\Windows\SysWOW64\net.exenet stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
PID:4760
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c sc config SharedAccess start= disabled2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Windows\SysWOW64\sc.exesc config SharedAccess start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:4348
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableTaskMgr" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v "EnableLUA" /t REG_DWORD /d "0" /f3⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4344
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d "2" /f2⤵
- System Location Discovery: System Language Discovery
PID:3264 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "Hidden" /t REG_DWORD /d "2" /f3⤵
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v "HideFileExt" /t REG_DWORD /d "1" /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
PID:1932
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoFolderOptions" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKLM\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoFolderOptions" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoFolderOptions" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:3756 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoFolderOptions" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:3396
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:4008 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoRun" /t REG_DWORD /d "1" /f3⤵
- System Location Discovery: System Language Discovery
PID:5068
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c net stop ERSvc2⤵
- System Location Discovery: System Language Discovery
PID:4244 -
C:\Windows\SysWOW64\net.exenet stop ERSvc3⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop ERSvc4⤵
- System Location Discovery: System Language Discovery
PID:4468
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c sc config ERSvc start= disabled2⤵
- System Location Discovery: System Language Discovery
PID:1272 -
C:\Windows\SysWOW64\sc.exesc config ERSvc start= disabled3⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:536
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d "1" /f2⤵
- System Location Discovery: System Language Discovery
PID:2044 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v "DisableRegistryTools" /t REG_DWORD /d "1" /f3⤵
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
PID:1152
-
-
-
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\System32\taskkill.exe" /IM cmd.exe2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c %windir%\System32\reg.exe add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "http://cmyip.com" /f2⤵
- System Location Discovery: System Language Discovery
PID:4948 -
C:\Windows\SysWOW64\reg.exeC:\Windows\System32\reg.exe add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_SZ /d "http://cmyip.com" /f3⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
3Hidden Files and Directories
3Impair Defenses
1Disable or Modify Tools
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
608KB
MD5763ef81345f2e3046e07ce3c9fc772b6
SHA1e7b4ee03f99b23be9d19bcdbc13a3ea8e3b7a852
SHA256f200b09ded14613804a32d367733c8e38e7c6d207a62e1c911b5ddf1e5a68545
SHA5122d068e5a57d4aa232b81116c00b7e9ed33e2c6cfe8b9e37bb88666b372471dc5232cbba4bb6fee383aabdc0a05c2c5bf174ccb2875653484f886f158ede9347e