Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 13:39
Static task
static1
Behavioral task
behavioral1
Sample
7449db518313590156bc5ee7a353327b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7449db518313590156bc5ee7a353327b_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
7449db518313590156bc5ee7a353327b_JaffaCakes118.exe
-
Size
744KB
-
MD5
7449db518313590156bc5ee7a353327b
-
SHA1
dcb882661c8d968c9a21fd425773fb1e14260d41
-
SHA256
234d2f8fdeb35d8e73e559f28cb87f69a93074a6c6e8bfa5b97ab444893e228c
-
SHA512
ab882451172c3855a8edbfae1c07af823b24949194ab3e423f6ab3b63ad6d9b509b457d39255ec7d133c2b692e159f9e4cbed449f154eedb8b1569e39339d890
-
SSDEEP
12288:oJ73bGitBjTwhkSJ3xPpCya20wHr0qWbULe8Jnlb:oDymmxPpVqwHr8bUqGt
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 2 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9722BFD-69B1-4e95-8405-F08A05E3F2C7} winsdk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{B9722BFD-69B1-4e95-8405-F08A05E3F2C7}\StubPath = "C:\\Windows\\Fonts\\winsdk.exe -a" winsdk.exe -
ACProtect 1.3x - 1.4x DLL software 1 IoCs
Detects file using ACProtect software.
resource yara_rule behavioral1/files/0x0006000000019412-27.dat acprotect -
Executes dropped EXE 3 IoCs
pid Process 2976 f76cc35.exe 2652 WindowsUpdate.exe 760 winsdk.exe -
Loads dropped DLL 8 IoCs
pid Process 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 2976 f76cc35.exe 2652 WindowsUpdate.exe 2340 rundll32.exe 2652 WindowsUpdate.exe 760 winsdk.exe 2340 rundll32.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\KeyBoardA.dat winsdk.exe -
Enumerates processes with tasklist 1 TTPs 15 IoCs
pid Process 2800 tasklist.exe 2748 tasklist.exe 1588 tasklist.exe 1604 tasklist.exe 1100 tasklist.exe 2664 tasklist.exe 2500 tasklist.exe 2496 tasklist.exe 540 tasklist.exe 1396 tasklist.exe 2872 tasklist.exe 2560 tasklist.exe 940 tasklist.exe 2776 tasklist.exe 1592 tasklist.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\Fonts\winsdk.exe WindowsUpdate.exe File opened for modification C:\Windows\Fonts\winsdk.exe WindowsUpdate.exe File created C:\Windows\Fonts\shutdown.bat winsdk.exe File opened for modification C:\Windows\Fonts\shutdown.bat winsdk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WindowsUpdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f76cc35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tasklist.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winsdk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language find.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 16 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 872 PING.EXE 2992 PING.EXE 2156 PING.EXE 2532 PING.EXE 1596 PING.EXE 3000 PING.EXE 304 PING.EXE 1928 PING.EXE 2788 PING.EXE 2368 PING.EXE 2276 PING.EXE 1568 PING.EXE 1684 PING.EXE 1204 PING.EXE 1696 PING.EXE 1044 PING.EXE -
Runs ping.exe 1 TTPs 16 IoCs
pid Process 304 PING.EXE 2156 PING.EXE 2368 PING.EXE 1204 PING.EXE 1568 PING.EXE 2992 PING.EXE 2532 PING.EXE 3000 PING.EXE 1044 PING.EXE 872 PING.EXE 2788 PING.EXE 2276 PING.EXE 1684 PING.EXE 1696 PING.EXE 1928 PING.EXE 1596 PING.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 1 2652 WindowsUpdate.exe Token: SeCreateTokenPrivilege 2652 WindowsUpdate.exe Token: SeAssignPrimaryTokenPrivilege 2652 WindowsUpdate.exe Token: SeLockMemoryPrivilege 2652 WindowsUpdate.exe Token: SeIncreaseQuotaPrivilege 2652 WindowsUpdate.exe Token: SeMachineAccountPrivilege 2652 WindowsUpdate.exe Token: SeTcbPrivilege 2652 WindowsUpdate.exe Token: SeSecurityPrivilege 2652 WindowsUpdate.exe Token: SeTakeOwnershipPrivilege 2652 WindowsUpdate.exe Token: SeLoadDriverPrivilege 2652 WindowsUpdate.exe Token: SeSystemProfilePrivilege 2652 WindowsUpdate.exe Token: SeSystemtimePrivilege 2652 WindowsUpdate.exe Token: SeProfSingleProcessPrivilege 2652 WindowsUpdate.exe Token: SeIncBasePriorityPrivilege 2652 WindowsUpdate.exe Token: SeCreatePagefilePrivilege 2652 WindowsUpdate.exe Token: SeCreatePermanentPrivilege 2652 WindowsUpdate.exe Token: SeBackupPrivilege 2652 WindowsUpdate.exe Token: SeRestorePrivilege 2652 WindowsUpdate.exe Token: SeShutdownPrivilege 2652 WindowsUpdate.exe Token: SeDebugPrivilege 2652 WindowsUpdate.exe Token: SeAuditPrivilege 2652 WindowsUpdate.exe Token: SeSystemEnvironmentPrivilege 2652 WindowsUpdate.exe Token: SeChangeNotifyPrivilege 2652 WindowsUpdate.exe Token: SeRemoteShutdownPrivilege 2652 WindowsUpdate.exe Token: SeUndockPrivilege 2652 WindowsUpdate.exe Token: SeSyncAgentPrivilege 2652 WindowsUpdate.exe Token: SeEnableDelegationPrivilege 2652 WindowsUpdate.exe Token: SeManageVolumePrivilege 2652 WindowsUpdate.exe Token: SeImpersonatePrivilege 2652 WindowsUpdate.exe Token: SeCreateGlobalPrivilege 2652 WindowsUpdate.exe Token: 1 760 winsdk.exe Token: SeCreateTokenPrivilege 760 winsdk.exe Token: SeAssignPrimaryTokenPrivilege 760 winsdk.exe Token: SeLockMemoryPrivilege 760 winsdk.exe Token: SeIncreaseQuotaPrivilege 760 winsdk.exe Token: SeMachineAccountPrivilege 760 winsdk.exe Token: SeTcbPrivilege 760 winsdk.exe Token: SeSecurityPrivilege 760 winsdk.exe Token: SeTakeOwnershipPrivilege 760 winsdk.exe Token: SeLoadDriverPrivilege 760 winsdk.exe Token: SeSystemProfilePrivilege 760 winsdk.exe Token: SeSystemtimePrivilege 760 winsdk.exe Token: SeProfSingleProcessPrivilege 760 winsdk.exe Token: SeIncBasePriorityPrivilege 760 winsdk.exe Token: SeCreatePagefilePrivilege 760 winsdk.exe Token: SeCreatePermanentPrivilege 760 winsdk.exe Token: SeBackupPrivilege 760 winsdk.exe Token: SeRestorePrivilege 760 winsdk.exe Token: SeShutdownPrivilege 760 winsdk.exe Token: SeDebugPrivilege 760 winsdk.exe Token: SeAuditPrivilege 760 winsdk.exe Token: SeSystemEnvironmentPrivilege 760 winsdk.exe Token: SeChangeNotifyPrivilege 760 winsdk.exe Token: SeRemoteShutdownPrivilege 760 winsdk.exe Token: SeUndockPrivilege 760 winsdk.exe Token: SeSyncAgentPrivilege 760 winsdk.exe Token: SeEnableDelegationPrivilege 760 winsdk.exe Token: SeManageVolumePrivilege 760 winsdk.exe Token: SeImpersonatePrivilege 760 winsdk.exe Token: SeCreateGlobalPrivilege 760 winsdk.exe Token: SeDebugPrivilege 1604 tasklist.exe Token: SeDebugPrivilege 1100 tasklist.exe Token: SeDebugPrivilege 2560 tasklist.exe Token: SeDebugPrivilege 2500 tasklist.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2340 rundll32.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 2976 f76cc35.exe 2976 f76cc35.exe 2652 WindowsUpdate.exe 2652 WindowsUpdate.exe 2652 WindowsUpdate.exe 760 winsdk.exe 760 winsdk.exe 760 winsdk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2976 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2976 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2976 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 31 PID 2956 wrote to memory of 2976 2956 7449db518313590156bc5ee7a353327b_JaffaCakes118.exe 31 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2340 2976 f76cc35.exe 32 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2976 wrote to memory of 2652 2976 f76cc35.exe 33 PID 2652 wrote to memory of 760 2652 WindowsUpdate.exe 34 PID 2652 wrote to memory of 760 2652 WindowsUpdate.exe 34 PID 2652 wrote to memory of 760 2652 WindowsUpdate.exe 34 PID 2652 wrote to memory of 760 2652 WindowsUpdate.exe 34 PID 2652 wrote to memory of 2136 2652 WindowsUpdate.exe 35 PID 2652 wrote to memory of 2136 2652 WindowsUpdate.exe 35 PID 2652 wrote to memory of 2136 2652 WindowsUpdate.exe 35 PID 2652 wrote to memory of 2136 2652 WindowsUpdate.exe 35 PID 760 wrote to memory of 2644 760 winsdk.exe 37 PID 760 wrote to memory of 2644 760 winsdk.exe 37 PID 760 wrote to memory of 2644 760 winsdk.exe 37 PID 760 wrote to memory of 2644 760 winsdk.exe 37 PID 2644 wrote to memory of 1044 2644 cmd.exe 39 PID 2644 wrote to memory of 1044 2644 cmd.exe 39 PID 2644 wrote to memory of 1044 2644 cmd.exe 39 PID 2644 wrote to memory of 1044 2644 cmd.exe 39 PID 2644 wrote to memory of 1604 2644 cmd.exe 40 PID 2644 wrote to memory of 1604 2644 cmd.exe 40 PID 2644 wrote to memory of 1604 2644 cmd.exe 40 PID 2644 wrote to memory of 1604 2644 cmd.exe 40 PID 2644 wrote to memory of 1884 2644 cmd.exe 41 PID 2644 wrote to memory of 1884 2644 cmd.exe 41 PID 2644 wrote to memory of 1884 2644 cmd.exe 41 PID 2644 wrote to memory of 1884 2644 cmd.exe 41 PID 2644 wrote to memory of 304 2644 cmd.exe 43 PID 2644 wrote to memory of 304 2644 cmd.exe 43 PID 2644 wrote to memory of 304 2644 cmd.exe 43 PID 2644 wrote to memory of 304 2644 cmd.exe 43 PID 2644 wrote to memory of 1100 2644 cmd.exe 44 PID 2644 wrote to memory of 1100 2644 cmd.exe 44 PID 2644 wrote to memory of 1100 2644 cmd.exe 44 PID 2644 wrote to memory of 1100 2644 cmd.exe 44 PID 2644 wrote to memory of 1096 2644 cmd.exe 45 PID 2644 wrote to memory of 1096 2644 cmd.exe 45 PID 2644 wrote to memory of 1096 2644 cmd.exe 45 PID 2644 wrote to memory of 1096 2644 cmd.exe 45 PID 2644 wrote to memory of 1684 2644 cmd.exe 46 PID 2644 wrote to memory of 1684 2644 cmd.exe 46 PID 2644 wrote to memory of 1684 2644 cmd.exe 46 PID 2644 wrote to memory of 1684 2644 cmd.exe 46 PID 2644 wrote to memory of 2560 2644 cmd.exe 47 PID 2644 wrote to memory of 2560 2644 cmd.exe 47 PID 2644 wrote to memory of 2560 2644 cmd.exe 47 PID 2644 wrote to memory of 2560 2644 cmd.exe 47 PID 2644 wrote to memory of 3056 2644 cmd.exe 48 PID 2644 wrote to memory of 3056 2644 cmd.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\7449db518313590156bc5ee7a353327b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\7449db518313590156bc5ee7a353327b_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Roaming\Microsoft\f76cc35.exe"C:\Users\Admin\AppData\Roaming\Microsoft\f76cc35.exe" dmedmedme "C:\Users\Admin\AppData\Local\Temp\7449db518313590156bc5ee7a353327b_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe shimgvw.dll,ImageView_Fullscreen C:\Users\Admin\AppData\Local\Temp\7449db518313590156bc5ee7a353327b_JaffaCakes118.jpg3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:2340
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exeC:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Fonts\winsdk.exe"C:\Windows\Fonts\winsdk.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Fonts\shutdown.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1044
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1604
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1884
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:304
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1100
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1096
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1684
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2560
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:3056
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2156
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2500
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2716
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1204
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:940
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1304
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1568
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2496
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1696
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:540
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:344
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2992
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1396
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2188
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:872
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1928
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2664
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2788
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2800
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2532
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2748
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1596
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2368
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:1588
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:1960
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2276
-
-
C:\Windows\SysWOW64\tasklist.exetasklist6⤵
- Enumerates processes with tasklist
- System Location Discovery: System Language Discovery
PID:2872
-
-
C:\Windows\SysWOW64\find.exefind /i "winsdk.exe"6⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 106⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3000
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Roaming\Microsoft\WindowsUpdate.exe"4⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5070cf6787aa56fbdaa1b2fd98708c34c
SHA1fb662cbd45033e03f65e0f278f44f4206a3c4293
SHA256e073f22bff5d22fdbf3665855d2f979d300c4e28421a7edf5d616dd92c71580f
SHA51293adca8cd47db7fd07d1bb0834c92ef0460d86975ee17276573223eb378d3cc7bc8324c0cd62c024664159b0320501d37bbc97d266a40ed2a51fb3e8e163ba52
-
Filesize
744KB
MD57449db518313590156bc5ee7a353327b
SHA1dcb882661c8d968c9a21fd425773fb1e14260d41
SHA256234d2f8fdeb35d8e73e559f28cb87f69a93074a6c6e8bfa5b97ab444893e228c
SHA512ab882451172c3855a8edbfae1c07af823b24949194ab3e423f6ab3b63ad6d9b509b457d39255ec7d133c2b692e159f9e4cbed449f154eedb8b1569e39339d890
-
Filesize
94B
MD5c21bf2e57aef714569dd66ca8193c9db
SHA1653129bc030f88cd3f1be5cc6e14c583ea5bc584
SHA256581b71fb62aa4b126fa348cc28b2eb846d1759054e92e6484ca1cc02a8f370ea
SHA5120d02009ec0f336a66e50bac9bef9ad01a04153766d00bc4c07b21efe90683d4df16875aaa84f8004269221dd75e57bd51a6f772e4a41b5d26d18f9f6e30c2708
-
Filesize
172KB
MD54f407b29d53e9eb54e22d096fce82aa7
SHA1a4ee25b066cac19ff679dd491f5791652bb71185
SHA256cf0ecf30fc95800a34105acb9bcb484bb594a35b3ef26ace8f122af4f9f888dc
SHA512325f7b599455195101e4c0dafd3654906d20ed2c1ce2a5f38784635e16ab545df6ee44a83bed6128239be2dee5be110552c7b246b7f52482ab31552e14b54183
-
Filesize
858KB
MD5d2bf05e59519088df879d7ab8f30c95c
SHA111440d9e0c840f8ab6fa91dfc55ce072e1c42b11
SHA2560a4bac084194005003b8161a1e099ecd4c49f3cfff0754f2a94617f2efe07a61
SHA51258e161ad6997b8e6066b149490d05d37bd147568840f812fec4ef908cca8fd64f87d3e28325f06e65f6ce731df8a77b2fed8f4b0e3eeb89714d9411ea20570ff