Analysis
-
max time kernel
149s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 10:43
Static task
static1
Behavioral task
behavioral1
Sample
73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe
-
Size
107KB
-
MD5
73b6b9bac022509c158065e7c8c1a642
-
SHA1
47ecfd3637832b18a3453a76b3376c624de14185
-
SHA256
095309f279adf0f20628cb44d1b0cfee89a188d9631ff3d56287b17756a1554e
-
SHA512
2e95d9ceb52e2f7d2701f59082c181210fcc219a6200ed9889e58edbcd06d12f5e035fcac781bf4c36d7230ebed0e479b13778a0f1f1480d1a5672dd40634017
-
SSDEEP
1536:vSRKvgtx1lr6an/Tz2vm2FuQUy5XXuSbCVTjmy5XXuSbCV6jXow:vSRKI732z5XD2d5XDDXow
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 46 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe -
Executes dropped EXE 22 IoCs
pid Process 2876 dll.exe 2904 dll.exe 2076 dll.exe 1136 dll.exe 2112 dll.exe 1760 dll.exe 1432 dll.exe 332 dll.exe 1992 dll.exe 1720 dll.exe 1728 dll.exe 2524 dll.exe 3060 dll.exe 1540 dll.exe 1560 dll.exe 1932 dll.exe 2680 dll.exe 2180 dll.exe 1380 dll.exe 572 dll.exe 672 dll.exe 2552 dll.exe -
Loads dropped DLL 23 IoCs
pid Process 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe 2128 svchost.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winxp\dll.exe 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe File opened for modification C:\Windows\winxp\dll.exe 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2128 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 30 PID 1932 wrote to memory of 2128 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 30 PID 1932 wrote to memory of 2128 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 30 PID 1932 wrote to memory of 2128 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 30 PID 1932 wrote to memory of 2128 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 30 PID 1932 wrote to memory of 2072 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2072 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2072 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2072 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2072 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 31 PID 1932 wrote to memory of 2784 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2784 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2784 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2784 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2784 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 32 PID 1932 wrote to memory of 2836 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 33 PID 1932 wrote to memory of 2836 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 33 PID 1932 wrote to memory of 2836 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 33 PID 1932 wrote to memory of 2836 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 33 PID 1932 wrote to memory of 2836 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 33 PID 1932 wrote to memory of 2852 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 34 PID 1932 wrote to memory of 2852 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 34 PID 1932 wrote to memory of 2852 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 34 PID 1932 wrote to memory of 2852 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 34 PID 1932 wrote to memory of 2852 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 34 PID 1932 wrote to memory of 2864 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 35 PID 1932 wrote to memory of 2864 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 35 PID 1932 wrote to memory of 2864 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 35 PID 1932 wrote to memory of 2864 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 35 PID 1932 wrote to memory of 2864 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 35 PID 1932 wrote to memory of 2884 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 36 PID 1932 wrote to memory of 2884 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 36 PID 1932 wrote to memory of 2884 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 36 PID 1932 wrote to memory of 2884 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 36 PID 1932 wrote to memory of 2884 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 36 PID 1932 wrote to memory of 2792 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 37 PID 1932 wrote to memory of 2792 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 37 PID 1932 wrote to memory of 2792 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 37 PID 1932 wrote to memory of 2792 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 37 PID 1932 wrote to memory of 2792 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 37 PID 1932 wrote to memory of 3020 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 38 PID 1932 wrote to memory of 3020 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 38 PID 1932 wrote to memory of 3020 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 38 PID 1932 wrote to memory of 3020 1932 73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe 38 PID 2128 wrote to memory of 2876 2128 svchost.exe 39 PID 2128 wrote to memory of 2876 2128 svchost.exe 39 PID 2128 wrote to memory of 2876 2128 svchost.exe 39 PID 2128 wrote to memory of 2876 2128 svchost.exe 39 PID 2876 wrote to memory of 2660 2876 dll.exe 40 PID 2876 wrote to memory of 2660 2876 dll.exe 40 PID 2876 wrote to memory of 2660 2876 dll.exe 40 PID 2876 wrote to memory of 2660 2876 dll.exe 40 PID 2876 wrote to memory of 2660 2876 dll.exe 40 PID 2876 wrote to memory of 1640 2876 dll.exe 41 PID 2876 wrote to memory of 1640 2876 dll.exe 41 PID 2876 wrote to memory of 1640 2876 dll.exe 41 PID 2876 wrote to memory of 1640 2876 dll.exe 41 PID 2876 wrote to memory of 1640 2876 dll.exe 41 PID 2876 wrote to memory of 2860 2876 dll.exe 42 PID 2876 wrote to memory of 2860 2876 dll.exe 42 PID 2876 wrote to memory of 2860 2876 dll.exe 42 PID 2876 wrote to memory of 2860 2876 dll.exe 42 PID 2876 wrote to memory of 2860 2876 dll.exe 42 PID 2876 wrote to memory of 2808 2876 dll.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\73b6b9bac022509c158065e7c8c1a642_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2660
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2860
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2692
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2760
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2196
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2000
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2272
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2412
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:692
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1844
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2696
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2972
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1840
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1628
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3024
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2040
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:584
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:332 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2224
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2364
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2008
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2092
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1984
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1936
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2176
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1692
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2228
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1556
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:688
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1492
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:776
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2204
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1788
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1236
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2260
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1536
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1540 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2456
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2856
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1916
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2664
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2804
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2920
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2876
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2680 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2080
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2188
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2376
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2248
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:972
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:968
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1620
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1380 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2932
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1760
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1504
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:572 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2220
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2156
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1124
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:672 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1240
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:904
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1572
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1060
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2328
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2056
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2552
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2072
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2836
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2884
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2792
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53a1a4dd734489b83768ce7c53a4a8309
SHA1f65c2c248e5d0fbd32aa8f0abcc449656947c37c
SHA256728eb7888142b33d4ef5d580a8bfc0ce209dbeba9fac9c27ad96edbc24956978
SHA512fd972afe63b7457666341e7ddd9db3b25a7c594294c36bdd06c141e695b1c2e8290041194175f33a60b3922357bd09a60571aa9b888038b09c924a05fd8167ed
-
Filesize
107KB
MD573b6b9bac022509c158065e7c8c1a642
SHA147ecfd3637832b18a3453a76b3376c624de14185
SHA256095309f279adf0f20628cb44d1b0cfee89a188d9631ff3d56287b17756a1554e
SHA5122e95d9ceb52e2f7d2701f59082c181210fcc219a6200ed9889e58edbcd06d12f5e035fcac781bf4c36d7230ebed0e479b13778a0f1f1480d1a5672dd40634017