Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/08/2024, 19:05
Static task
static1
Behavioral task
behavioral1
Sample
8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe
-
Size
141KB
-
MD5
8b9c17b3fc345f633a97ac7d610d0767
-
SHA1
1358821b1b308e22cbb45a6e5406f319ffbae206
-
SHA256
7618d79974d531e449c2e3074dbb985d1e541214810c747162750df517def4bd
-
SHA512
fa0c1bb7ebb092c6b04dd8276e6a3260df50bdefdbd16ec754a22b5e26e784aaca4e5d2e903f1157c347d0731a97df041020a90d3ae515b07298bb593d1fc3b7
-
SSDEEP
3072:ZdJhuS+pryw7RSPJlZsvBtjoRi0XvDrW1cq3:9L+pryw7RSPJUDjcnLm
Malware Config
Extracted
xtremerat
besbous.no-ip.info
Signatures
-
Detect XtremeRAT payload 8 IoCs
resource yara_rule behavioral2/memory/332-4-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/332-5-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/332-6-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/332-7-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/1020-11-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/332-14-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/1932-23-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat behavioral2/memory/1932-35-0x0000000000C80000-0x0000000000C93000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 6 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\Windows\\InstallDir\\Server.exe restart" Server.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\Control Panel\International\Geo\Nation Server.exe -
Executes dropped EXE 31 IoCs
pid Process 4376 Server.exe 1932 Server.exe 1064 Server.exe 4008 Server.exe 2200 Server.exe 5104 Server.exe 2160 Server.exe 4412 Server.exe 1416 Server.exe 4744 Server.exe 2016 Server.exe 1180 Server.exe 964 Server.exe 4848 Server.exe 4908 Server.exe 4608 Server.exe 724 Server.exe 2484 Server.exe 4288 Server.exe 1704 Server.exe 4336 Server.exe 4400 Server.exe 348 Server.exe 932 Server.exe 4004 Server.exe 4144 Server.exe 4836 Server.exe 2792 Server.exe 2284 Server.exe 1060 Server.exe 5004 Server.exe -
Adds Run key to start application 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\Server.exe" svchost.exe -
Maps connected drives based on registry 3 TTPs 4 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum Server.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 Server.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2344 set thread context of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 4376 set thread context of 1932 4376 Server.exe 103 -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\Server.exe 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe File created C:\Windows\InstallDir\Server.exe 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 34 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Suspicious use of SetWindowsHookEx 31 IoCs
pid Process 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 4376 Server.exe 1064 Server.exe 4008 Server.exe 2200 Server.exe 5104 Server.exe 2160 Server.exe 4412 Server.exe 1416 Server.exe 4744 Server.exe 2016 Server.exe 1180 Server.exe 964 Server.exe 4848 Server.exe 4908 Server.exe 4608 Server.exe 724 Server.exe 2484 Server.exe 4288 Server.exe 1704 Server.exe 4336 Server.exe 4400 Server.exe 348 Server.exe 932 Server.exe 4004 Server.exe 4144 Server.exe 4836 Server.exe 2792 Server.exe 2284 Server.exe 1060 Server.exe 5004 Server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 2344 wrote to memory of 332 2344 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 88 PID 332 wrote to memory of 1020 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 89 PID 332 wrote to memory of 1020 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 89 PID 332 wrote to memory of 1020 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 89 PID 332 wrote to memory of 1020 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 89 PID 332 wrote to memory of 3528 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 90 PID 332 wrote to memory of 3528 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 90 PID 332 wrote to memory of 3528 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 90 PID 332 wrote to memory of 3672 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 91 PID 332 wrote to memory of 3672 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 91 PID 332 wrote to memory of 3672 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 91 PID 332 wrote to memory of 4716 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 92 PID 332 wrote to memory of 4716 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 92 PID 332 wrote to memory of 4716 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 92 PID 332 wrote to memory of 2204 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 95 PID 332 wrote to memory of 2204 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 95 PID 332 wrote to memory of 2204 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 95 PID 332 wrote to memory of 3728 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 96 PID 332 wrote to memory of 3728 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 96 PID 332 wrote to memory of 3728 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 96 PID 332 wrote to memory of 2724 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 98 PID 332 wrote to memory of 2724 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 98 PID 332 wrote to memory of 2724 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 98 PID 332 wrote to memory of 2476 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 99 PID 332 wrote to memory of 2476 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 99 PID 332 wrote to memory of 2476 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 99 PID 332 wrote to memory of 4616 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 100 PID 332 wrote to memory of 4616 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 100 PID 332 wrote to memory of 4376 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 101 PID 332 wrote to memory of 4376 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 101 PID 332 wrote to memory of 4376 332 8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe 101 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 4376 wrote to memory of 1932 4376 Server.exe 103 PID 1932 wrote to memory of 948 1932 Server.exe 104 PID 1932 wrote to memory of 948 1932 Server.exe 104 PID 1932 wrote to memory of 948 1932 Server.exe 104 PID 1932 wrote to memory of 1132 1932 Server.exe 105 PID 1932 wrote to memory of 1132 1932 Server.exe 105 PID 1932 wrote to memory of 1132 1932 Server.exe 105 PID 1932 wrote to memory of 3524 1932 Server.exe 106 PID 1932 wrote to memory of 3524 1932 Server.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe"1⤵
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\8b9c17b3fc345f633a97ac7d610d0767_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1064
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2200
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5104
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4412
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4744
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2016
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1180
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:964
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4848
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4908
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4608
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:724
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2484
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4288
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1704
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4400
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:348
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:932
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4004
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4144
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4836
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1060
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5004
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3528
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3672
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4716
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2204
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:3728
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2724
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:2476
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"3⤵PID:4616
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"3⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\InstallDir\Server.exeC:\Windows\InstallDir\Server.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:948
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:1132
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3524
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3912
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:2696
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3188
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:2424
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"5⤵PID:3716
-
-
C:\Windows\InstallDir\Server.exe"C:\Windows\InstallDir\Server.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4008
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b144680cd02c80c0f28f558b0d8ab13c
SHA1a47cd12258beea15fbf0a69d7cec90ebab34087e
SHA2564d3fb3f26ee6e528f8c47ceadd7526754a76f79741bd13ae4a9ad0a816421244
SHA51258946d34fb1301bddd5e57b927dd6e9495bac2b1dc2b3d33ef156825fdcd0008956c0bed7e0515463da8c55e67236809a9e242338d065944711bb63a7007a55f
-
Filesize
141KB
MD58b9c17b3fc345f633a97ac7d610d0767
SHA11358821b1b308e22cbb45a6e5406f319ffbae206
SHA2567618d79974d531e449c2e3074dbb985d1e541214810c747162750df517def4bd
SHA512fa0c1bb7ebb092c6b04dd8276e6a3260df50bdefdbd16ec754a22b5e26e784aaca4e5d2e903f1157c347d0731a97df041020a90d3ae515b07298bb593d1fc3b7