Analysis
-
max time kernel
150s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11/08/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe
-
Size
141KB
-
MD5
8b9c17b3fc345f633a97ac7d610d0767
-
SHA1
1358821b1b308e22cbb45a6e5406f319ffbae206
-
SHA256
7618d79974d531e449c2e3074dbb985d1e541214810c747162750df517def4bd
-
SHA512
fa0c1bb7ebb092c6b04dd8276e6a3260df50bdefdbd16ec754a22b5e26e784aaca4e5d2e903f1157c347d0731a97df041020a90d3ae515b07298bb593d1fc3b7
-
SSDEEP
3072:ZdJhuS+pryw7RSPJlZsvBtjoRi0XvDrW1cq3:9L+pryw7RSPJUDjcnLm
Malware Config
Extracted
xtremerat
besbous.no-ip.info
Signatures
-
Detect XtremeRAT payload 14 IoCs
resource yara_rule behavioral1/memory/2028-10-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-7-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-9-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-14-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-16-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-8-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-6-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-15-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-17-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2720-23-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2028-28-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2348-48-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral1/memory/2720-51-0x0000000000710000-0x0000000000778000-memory.dmp family_xtremerat behavioral1/memory/2348-58-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe -
Executes dropped EXE 31 IoCs
pid Process 2612 Server.exe 2348 Server.exe 2044 Server.exe 2364 Server.exe 1136 Server.exe 1280 Server.exe 2168 Server.exe 2000 Server.exe 2172 Server.exe 1004 Server.exe 2336 Server.exe 1896 Server.exe 2960 Server.exe 1908 Server.exe 268 Server.exe 2296 Server.exe 1320 Server.exe 1676 Server.exe 2980 Server.exe 2396 Server.exe 2756 Server.exe 2716 Server.exe 2688 Server.exe 2020 Server.exe 2068 Server.exe 376 Server.exe 2748 Server.exe 280 Server.exe 1860 Server.exe 2196 Server.exe 2956 Server.exe -
Loads dropped DLL 30 IoCs
pid Process 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe 2720 svchost.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 Server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2892 set thread context of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2612 set thread context of 2348 2612 Server.exe 43 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe File created C:\Windows\InstallDir\Server.exe 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 2612 Server.exe 2044 Server.exe 2364 Server.exe 1136 Server.exe 1280 Server.exe 2168 Server.exe 2000 Server.exe 2172 Server.exe 1004 Server.exe 2336 Server.exe 1896 Server.exe 2960 Server.exe 1908 Server.exe 268 Server.exe 2296 Server.exe 1320 Server.exe 1676 Server.exe 2980 Server.exe 2396 Server.exe 2756 Server.exe 2716 Server.exe 2688 Server.exe 2020 Server.exe 2068 Server.exe 376 Server.exe 2748 Server.exe 280 Server.exe 1860 Server.exe 2196 Server.exe 2956 Server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2892 wrote to memory of 2028 2892 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 31 PID 2028 wrote to memory of 2720 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 33 PID 2028 wrote to memory of 2720 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 33 PID 2028 wrote to memory of 2720 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 33 PID 2028 wrote to memory of 2720 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 33 PID 2028 wrote to memory of 2720 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 33 PID 2028 wrote to memory of 2928 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2928 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2928 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2928 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2928 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 34 PID 2028 wrote to memory of 2644 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 35 PID 2028 wrote to memory of 2644 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 35 PID 2028 wrote to memory of 2644 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 35 PID 2028 wrote to memory of 2644 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 35 PID 2028 wrote to memory of 2644 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 35 PID 2028 wrote to memory of 2904 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2904 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2904 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2904 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 36 PID 2028 wrote to memory of 2904 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 36 PID 2028 wrote to memory of 3044 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 37 PID 2028 wrote to memory of 3044 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 37 PID 2028 wrote to memory of 3044 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 37 PID 2028 wrote to memory of 3044 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 37 PID 2028 wrote to memory of 3044 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 37 PID 2028 wrote to memory of 2752 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 38 PID 2028 wrote to memory of 2752 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 38 PID 2028 wrote to memory of 2752 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 38 PID 2028 wrote to memory of 2752 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 38 PID 2028 wrote to memory of 2752 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 38 PID 2028 wrote to memory of 2832 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 39 PID 2028 wrote to memory of 2832 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 39 PID 2028 wrote to memory of 2832 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 39 PID 2028 wrote to memory of 2832 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 39 PID 2028 wrote to memory of 2832 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 39 PID 2028 wrote to memory of 1900 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 40 PID 2028 wrote to memory of 1900 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 40 PID 2028 wrote to memory of 1900 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 40 PID 2028 wrote to memory of 1900 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 40 PID 2028 wrote to memory of 1900 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 40 PID 2028 wrote to memory of 2664 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 41 PID 2028 wrote to memory of 2664 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 41 PID 2028 wrote to memory of 2664 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 41 PID 2028 wrote to memory of 2664 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 41 PID 2028 wrote to memory of 2612 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 42 PID 2028 wrote to memory of 2612 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 42 PID 2028 wrote to memory of 2612 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 42 PID 2028 wrote to memory of 2612 2028 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 42 PID 2612 wrote to memory of 2348 2612 Server.exe 43 PID 2612 wrote to memory of 2348 2612 Server.exe 43 PID 2612 wrote to memory of 2348 2612 Server.exe 43 PID 2612 wrote to memory of 2348 2612 Server.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1136
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1280
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2000
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2336
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1908
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:268
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2296
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1320
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1676
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2980
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2716
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2688
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2020
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2068
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:376
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:280
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1860
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2196
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2956
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2644
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2904
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:3044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2752
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2664
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:396
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:372
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2648
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2016
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2596
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1692
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1464
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2364
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b144680cd02c80c0f28f558b0d8ab13c
SHA1a47cd12258beea15fbf0a69d7cec90ebab34087e
SHA2564d3fb3f26ee6e528f8c47ceadd7526754a76f79741bd13ae4a9ad0a816421244
SHA51258946d34fb1301bddd5e57b927dd6e9495bac2b1dc2b3d33ef156825fdcd0008956c0bed7e0515463da8c55e67236809a9e242338d065944711bb63a7007a55f
-
Filesize
141KB
MD58b9c17b3fc345f633a97ac7d610d0767
SHA11358821b1b308e22cbb45a6e5406f319ffbae206
SHA2567618d79974d531e449c2e3074dbb985d1e541214810c747162750df517def4bd
SHA512fa0c1bb7ebb092c6b04dd8276e6a3260df50bdefdbd16ec754a22b5e26e784aaca4e5d2e903f1157c347d0731a97df041020a90d3ae515b07298bb593d1fc3b7