Analysis
-
max time kernel
149s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-08-2024 17:49
Static task
static1
Behavioral task
behavioral1
Sample
970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe
-
Size
160KB
-
MD5
970fdc305af59de34a6ede26427d54f1
-
SHA1
fa8129ab356bc4f7f191c34e1550f84bfade1123
-
SHA256
9356e999257918f3fb9360a2ab1e215f775247f6ce3ad05155e3fac2e9a7bbc6
-
SHA512
6c301fe665f2b8334693ca5e2f0aaa3527dd4276e0ce2200b35a5597de2ad799316ebbbcba4e081b9a866c377fe9eda4f2c9dc26ab753751042f2c2ffe61cd10
-
SSDEEP
1536:vFcsYqm5fiy0ZQwSkADSjq3tLmOhy7QK1YtnKr3oJ789wjTX66h/qXfRQ:v80ZQ2kL3RmOhF4YQMJg9MTK7Q
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "3" svchost.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UACDisableNotify = "1" svchost.exe -
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts svchost.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\alertsvc.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\claw95.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\generics.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zapsetup3001.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackice.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\dvp95_0.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pfwadmin.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\taskkill.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\zonalarm.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\frw.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netscanpro.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\pavsched.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscenu6.02d30.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vsstat.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\nvapsvc.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vscan40.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpro.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldscan.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\neomonitor.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rapapp.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\rav7.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cclaw.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\atcon.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cpf9x206.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\cwntdwmo.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ent.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpftray.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\setupvameeval.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tcm.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vbwin9x.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\csinsm32.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\defalert.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\FirewallSettings.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\icloadnt.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\programauditor.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GenericRenosFix.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\bidserver.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackd.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\drwatson.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\luspt.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\vettray.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpm.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avptc32.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\blackd.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fwinstall.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tfak5.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avxw.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\n32scan.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\scrscan.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sdclt.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\tds2-98.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\explored.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\ldpromenu.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\mpfagent.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navrunr.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\navw32.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\fix-it.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\netinfo.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\trjsetup.exe svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\esafe.exe\Debugger = "\"C:\\Users\\Admin\\Admin1\\winlogon.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\shn.exe svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\avpexec.exe svchost.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 3148 winlogon.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NVIDIA Media Center Library = "C:\\Users\\Admin\\Admin1\\winlogon.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3148 set thread context of 1340 3148 winlogon.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Internet Explorer\Main svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Local Page = "http://m-v-a-j-y-2-c-6-j-.h-.5-b-e-n-t-f-p-p-7-1-1-0-7-c-q-0-3-00-6-u-7-t-1-n-y-q-u-f-u.info/j-9-9-8-9-m-9-5-5-z-0-1-q-6-h-a-e-6-m-1-9-7-l-c-9-l-6-6-d-v-l-e-6-x-c-l-r-d-q-u-l-x-8-v-2-e-n-u-q-6-a-e-9-r-w-1-7-4-0-2-8-6-7-3-7-z-5-w-l-k-3-8-t-b-5-3-5-4-3-4-z-8-a-0-0-4-4-2-c-u-4-u-g-k-t-5-z-l-6-i-o-6-4-8-6-r-2-z-s-r-1-1-n-6-r-e-r-e-5-4-e-t-e-5-7-2-8-9-4-5-4-c-g-0-1-h-4-0-4-9-a-1-b-3-m-e-2-6-0-h-k-b-1-n-j-8-l-4-e-8-4-o-j-j-7-w-6-g-2-2-2-5-7-d-3-0-c-t-0-8-h-9-1-4-l-3-h-u-r-2-0-o-f-t-p-4-3-3-g-0-n-7-8-0-b-8-j-t-q-5-2-w-7-j-e-6-2-5-2-t-6-9-6-2-0-h-j-o-2-v-e-x-3-s-6-5-g-o-2-n-i-9-1-0-6-8-q-e-6-3-3-x-r-7-j-1-2-m-y-z-t-4-s-b-a-3-7-k-q-4-h-6-4-a-a-7-2-6-7-0-1-8-b-5-y-8-h-p-x-5-p-8-0-m-c-8-v-z-5-9-j-9-s-m-2-1-0-a-8-9-y-s-v-5-4-y-s-q-u-8-j-8-o-6-4-e-o-3-y-u-e-f-7-0-v-1-z-5-4-2-p-1-2-2-z-5-8-h-g-h-b-a-w-4-0-j-1-v-3-9-s-0-y-6-a-2-u-y-8-5-6-5-8-3-1-a-x-e-o-8-8-0-3-4-6-7-4-k-l-q-u-9-3-0-0-4-l-6-y-1-1-f-6-3-t-8-6-2-u-6-s-9-6-d-x-l-0-x-7-9-5-x-0-4-b-z-8-v-2-5-5-9-d-x-9-v-6-8-e-c-8-1-q-6-z-8-a-1-f-g-m-j-t-8-j-7-d-1-l-0-6-1-s-6-a-x-6-1-6-s-w-x-4-z-5-4-b-4-w-x-3-y-7-t-g-r-0-d-7-7-e-j-z-u-v-l-c-k-a-6-2-q-b-y-v-k-6-3-1-e-7-8-w-i-8-l-i-r-2-v-3-0-3-a-l-r-0-r-5-7-3-p-l-v-y-3-d-6-i-v-o-2-9-3-9-5-9-6-g-1-3-d-9-3-0-3-2-a-t-4-7-a-8-e-p-p-8-5-r-a-7-9-4-y-6-5-7-9-j-r-g-2-5-f-9-u-r-k-t-0-b-2-7-o-7-6-z-1-9-6-6-6-1-d-0-m-1-v-6-7-j-7-5-3-1-3-p-t-k-q-d-e-2-0-a-6-3-i-u-u-4-9-l-9-t-4-7-1-6-i-7-2-e-b-l-o-2-8-0-3-n-2-6-m-q-g-6-5-y-3-i-r-7-r-1-0-x-3-r-e-4-3-4-p-0-9-1-f-f-8-q-9-g-3-o-2-l-d-9-4-6-1-7-d-9-c-1-2-u-8-0-8-u-c-z-b-1-5-y-o-g-7-5-8-v-3-0-v-8-8-2-5-w-7-4-k-3-4-p-7-6-4-h-3-9-8-5-9-9-g-b-8-6-r-c-0-o-4-5-3-1-7-q-2-s-o-p-t-i-a-7-8-7-e-5-y-0-8-j-4-4-2-7-" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Local Page = "http://g-i-h-n-0-1-9-.y-7-k-v-y-7-.u-l-c-6-e-p-a-a-0-z-m-s-m-00-v-2-i-7-5-f-l-7-7-l-t-j-h-h-9.info/o-j-3-1-t-x-1-4-6-7-4-u-y-m-t-1-e-9-7-o-2-e-6-9-v-m-8-2-z-e-c-j-p-0-l-9-v-7-3-9-r-q-p-z-5-6-g-u-5-5-q-w-2-s-6-z-9-f-0-4-3-a-5-y-v-m-7-7-i-z-p-4-l-i-5-2-1-2-i-4-2-9-w-2-w-r-6-a-y-9-2-7-u-3-7-7-5-0-4-u-5-7-b-1-g-1-m-6-0-m-1-j-5-q-r-9-i-j-c-4-0-9-o-4-s-o-x-8-y-v-8-2-8-k-a-j-2-i-7-r-5-p-d-v-p-s-i-f-x-a-d-4-p-4-h-u-2-s-1-s-h-2-i-4-3-d-7-2-8-d-m-k-u-x-3-b-u-4-c-3-v-w-0-i-u-p-q-9-u-1-9-l-v-3-y-4-2-e-4-d-e-v-a-1-0-5-e-3-2-c-1-4-3-1-c-h-8-7-y-3-l-1-3-i-v-6-b-u-9-8-j-g-n-p-6-d-r-8-7-9-i-y-w-y-t-e-m-5-0-2-j-a-n-8-7-6-o-e-w-4-6-2-u-v-1-t-l-p-8-0-4-b-f-2-j-z-g-d-5-4-p-d-1-j-2-p-g-q-e-2-6-x-m-v-9-d-2-4-8-w-7-l-k-y-1-1-9-8-c-3-l-g-8-8-r-6-y-p-f-5-b-1-6-g-8-6-e-k-c-d-9-1-7-1-9-w-m-b-y-t-5-9-m-c-9-4-0-y-u-1-8-5-3-0-1-8-z-1-p-8-0-w-1-q-9-5-2-c-j-1-m-z-8-3-8-h-1-3-p-r-b-m-4-0-i-h-3-u-0-l-5-w-1-9-q-q-u-8-7-8-b-6-8-u-i-p-8-c-u-s-5-0-z-u-2-d-2-0-4-4-k-8-2-5-8-6-6-k-4-h-4-3-8-7-3-k-1-1-7-t-0-8-1-2-8-4-m-d-4-r-8-1-2-5-w-2-2-g-k-f-b-1-6-9-9-w-1-c-m-c-7-n-f-9-6-r-w-5-3-3-0-3-6-y-7-v-u-d-r-9-1-f-9-6-7-v-p-1-5-1-t-t-1-p-m-h-i-4-h-k-f-9-j-2-f-f-2-9-f-4-k-0-2-t-m-9-x-f-c-u-v-s-0-4-f-h-1-d-j-u-k-i-f-1-p-7-7-1-a-1-3-5-p-6-8-b-7-n-j-3-r-1-e-0-u-2-0-8-4-7-0-0-4-5-6-3-b-0-l-b-2-6-5-6-p-2-2-3-0-4-k-6-5-m-v-o-c-o-0-4-r-2-6-4-6-f-8-6-y-4-6-1-f-8-9-y-p-8-6-x-7-z-2-d-0-9-c-3-2-5-l-4-a-c-4-f-2-6-w-4-5-0-5-r-d-u-8-6-v-8-3-9-w-l-c-e-i-8-2-6-5-5-l-0-7-j-q-q-4-1-1-v-1-2-4-x-3-v-n-1-6-n-5-u-8-a-2-z-" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Search Page = "http://e-d-q-t-e-.l-8-c-p-7-8-.a-l-v-d-z-o0-n-x-6-v-0-q-q-m-7-g-d-z-7-7-o-b-m-7-z-4-a-q-0.info/9-2-4-m-l-l-p-v-o-z-f-k-1-f-n-f-y-9-9-a-e-z-p-z-a-y-7-0-b-i-p-m-w-2-2-4-4-9-q-3-8-f-9-m-n-9-a-k-7-5-8-5-3-5-3-7-2-d-g-4-o-k-3-r-5-1-4-1-v-e-1-8-0-z-e-8-f-9-a-d-j-g-k-y-9-a-6-5-k-9-2-h-o-9-6-o-g-2-2-t-t-k-h-6-2-4-c-q-5-5-7-6-e-h-r-3-g-5-7-7-u-r-1-s-h-0-x-3-2-7-b-5-m-8-4-8-w-x-a-g-7-8-o-g-3-w-z-e-l-l-9-6-q-4-e-0-0-1-2-g-7-9-z-8-f-r-7-v-0-q-1-w-0-1-p-1-2-g-5-5-v-x-4-h-e-6-5-n-9-3-0-q-9-0-i-8-2-2-m-7-a-w-7-t-7-8-1-5-z-7-s-6-6-1-m-b-6-m-4-j-l-9-3-r-2-k-i-7-8-8-y-9-1-v-c-1-0-9-k-7-8-4-6-y-d-5-3-f-3-1-2-8-q-f-6-6-8-e-g-9-3-6-3-6-n-8-k-3-f-x-6-0-1-u-6-5-5-3-3-9-5-9-c-g-8-j-0-7-8-p-i-n-7-x-x-9-n-0-x-m-m-w-2-5-b-x-w-r-c-6-p-5-k-e-3-u-f-s-u-2-7-9-8-7-o-8-x-j-i-7-x-x-c-d-h-r-8-c-q-q-1-u-l-g-g-z-e-r-d-l-1-4-p-o-y-a-w-u-q-z-2-e-6-w-j-8-c-5-8-5-2-s-8-b-0-i-2-r-w-2-7-8-4-q-7-5-0-4-9-9-2-0-4-6-3-o-4-l-8-4-f-q-v-0-4-r-8-z-u-l-q-r-4-c-w-x-j-2-2-3-1-5-1-8-h-3-h-2-6-a-y-s-f-5-s-a-2-v-v-5-0-q-7-g-2-5-6-6-7-8-w-9-6-8-4-r-y-5-r-h-h-w-5-m-d-4-1-u-4-8-4-d-e-4-m-2-r-j-0-0-2-q-d-4-6-e-4-7-6-4-u-u-4-2-8-b-e-6-3-6-j-z-8-1-o-c-b-7-7-w-j-i-9-w-3-e-n-6-j-2-t-l-8-0-5-l-1-6-6-m-q-8-1-4-3-s-j-8-t-h-8-g-7-u-f-7-s-3-k-6-m-4-4-q-1-i-t-6-t-5-7-b-e-p-1-n-e-1-9-0-7-9-f-8-5-r-1-6-m-g-o-3-a-6-x-i-z-8-h-c-v-z-6-7-2-e-p-3-5-7-4-u-k-9-a-7-a-g-f-r-x-0-h-z-h-d-m-7-5-x-l-0-r-2-8-s-0-v-s-3-t-q-1-4-8-5-5-j-i-s-5-1-g-1-8-w-4-b-3-e-9-s-m-w-n-5-j-g-z-7-t-7-0-e-2-f-l-1-1-w-7-j-3-h-u-p-4-f-8-t-8-w-s-n-6-6-6-c-5-p-1-3-9-q-5-o-e-j-3-7-9-o-p-4-9-k-s-u-i-g-s-k-f-b-x-6-d-t-2-f-p-z-x-7-5-3-" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://2-1-2-5-0-l-8-5-9-2-j-u-a-3-8-m-u-d-2-1-j-6-1-7-n-8-2-r-2.-u-.j-z-0-3-0-u-u-x-f-1l-3-l-h-w-b-q-z-u-5-n-l-l-m-s-5-v-s-z-g.info/2-9-h-b-b-n-y-e-d-l-5-n-0-l-7-s-6-y-5-d-2-6-7-t-0-t-g-m-e-x-d-p-5-j-6-l-7-o-8-7-p-r-b-1-g-a-6-w-0-r-e-9-z-9-z-a-9-7-v-o-6-2-f-m-p-k-0-7-d-f-b-t-m-m-g-t-p-f-n-o-k-c-a-8-4-z-u-9-4-m-1-7-4-k-j-b-u-g-v-i-3-7-y-n-a-2-j-6-3-i-5-0-z-l-3-1-z-z-i-6-6-f-p-3-t-o-v-5-h-e-g-3-" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Page_URL = "http://4-8-x.-6-x-h-1-4-n-v-e-x-6-q-t-e-8-.i-k-r-g-1-0-u-5-1-f-3-g-li-9-p-1-x-t-6-g-l-8-m-q-y-s-k-6-l.info/3-a-p-o-1-g-9-y-5-5-a-z-m-c-7-3-9-0-x-u-3-d-2-e-f-f-3-5-1-7-y-v-g-d-6-e-n-5-9-r-4-1-3-7-3-o-i-4-2-q-2-n-u-8-o-e-i-n-4-1-d-8-j-0-8-v-j-5-0-f-r-4-y-t-k-u-m-8-r-h-1-9-4-d-4-9-8-j-h-b-p-2-l-x-7-9-2-g-c-a-0-j-4-q-j-t-5-4-b-2-e-9-d-c-v-y-s-t-2-0-2-0-w-0-3-2-k-z-" svchost.exe Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Software\Microsoft\Internet Explorer\Main svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Search Page = "http://6.-c-.u-l-c-6-e-p-a-a-0-z-m-s-m-00-v-2-i-7-5-f-l-7-7-l-t-j-h-h-9.info/2-t-2-a-0-8-w-7-j-3-c-j-j-a-d-x-l-4-r-m-r-3-3-7-3-m-g-6-5-8-4-i-j-g-3-3-7-8-4-r-8-6-6-l-l-b-v-h-5-b-g-9-x-1-1-u-4-7-i-1-6-l-3-b-p-p-4-5-6-1-o-h-n-5-2-z-t-7-c-9-y-s-x-m-4-3-6-o-t-6-5-2-1-8-a-e-1-d-7-y-v-t-k-8-p-a-e-g-4-n-1-b-7-6-y-g-4-b-y-4-p-3-2-g-f-4-q-x-3-a-n-s-6-0-h-5-i-n-r-m-8-m-3-9-i-b-5-p-1-5-l-6-2-e-o-h-0-3-l-4-3-5-c-d-k-3-4-t-9-e-9-y-g-9-8-8-w-2-c-6-9-c-i-3-y-h-v-6-0-y-s-2-4-z-p-4-2-7-d-6-7-h-g-8-8-d-y-9-6-4-s-8-y-9-w-8-x-9-g-6-g-i-6-i-8-o-3-9-5-o-5-k-9-1-w-4-8-2-x-p-v-y-6-2-m-i-h-4-l-4-1-n-b-8-q-a-9-4-q-8-3-0-a-3-v-8-0-0-5-r-x-y-7-y-2-1-7-n-w-3-7-c-r-4-s-6-t-6-8-0-q-4-d-4-t-7-q-w-a-8-d-5-2-3-s-6-t-w-0-7-v-w-0-a-1-r-3-1-3-3-8-o-6-w-a-b-a-8-o-h-0-d-z-1-e-y-8-l-3-q-5-2-k-d-6-4-u-5-4-4-6-4-2-1-8-l-h-0-b-9-y-k-3-1-g-7-9-b-m-4-2-6-6-3-9-m-8-8-v-2-9-8-y-1-1-e-5-l-1-t-c-1-y-4-g-0-f-o-7-9-v-0-8-1-l-1-5-1-7-f-p-a-k-6-k-6-9-7-b-c-9-i-4-7-w-t-y-h-1-8-y-7-e-3-2-n-2-b-q-i-7-9-h-1-w-a-j-3-8-i-m-6-8-1-g-c-9-4-6-9-2-x-s-8-s-q-7-8-2-2-i-3-0-f-1-w-r-2-z-4-1-z-1-3-d-h-8-3-m-9-6-g-7-9-h-m-s-f-r-5-w-9-9-l-v-i-k-4-a-6-5-1-9-a-3-5-0-1-m-8-q-h-h-p-9-1-9-v-4-h-1-r-1-5-q-8-4-5-3-0-1-i-k-t-r-7-g-h-8-x-3-s-7-8-r-1-d-8-z-1-e-d-5-p-m-c-t-7-0-a-g-b-k-6-r-k-m-h-1-y-7-8-u-2-y-w-1-d-n-i-5-t-1-z-b-p-b-y-o-n-y-1-h-q-9-7-6-4-6-a-i-u-0-f-z-u-p-p-w-8-3-u-9-w-n-d-9-8-1-3-f-3-3-0-7-b-c-b-p-1-3-1-y-0-9-2-2-4-8-2-1-n-8-l-m-6-r-7-3-p-9-5-a-4-q-0-9-5-0-6-s-s-y-w-i-8-7-e-r-p-c-d-g-4-2-p-3-5-u-1-t-e-v-v-g-1-8-j-b-4-0-9-i-k-q-4-6-r-s-" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://v-5-.f-4-6-1-4-7-4-w-4-q-7-d-f-d-3-f-s-6-5-c-.5-b-e-n-t-f-p-p-7-1-1-0-7-c-q-0-3-00-6-u-7-t-1-n-y-q-u-f-u.info/e-p-f-0-0-c-v-3-q-1-6-1-6-5-4-c-e-8-7-u-c-b-0-7-r-1-2-7-8-7-7-b-1-c-b-g-7-1-c-6-1-s-g-t-r-b-z-7-0-l-h-y-8-m-3-5-8-8-v-7-7-p-n-q-o-8-7-3-1-z-a-8-o-n-2-g-x-j-6-2-l-i-7-b-3-t-4-2-b-w-9-u-x-3-6-g-n-9-q-5-3-7-w-1-1-w-0-w-p-7-v-b-5-v-o-4-8-1-o-2-5-o-w-c-6-3-k-2-i-w-v-1-7-w-8-8-1-y-6-9-y-j-s-h-q-e-7-f-q-x-9-7-r-1-8-y-g-t-z-t-2-7-6-g-m-k-g-f-8-b-n-q-2-o-n-1-z-5-7-t-9-h-9-9-n-8-c-o-8-v-q-1-o-7-k-g-8-r-2-4-4-m-v-2-8-o-5-0-u-i-7-2-z-n-6-f-k-z-9-2-w-8-q-n-l-2-2-3-1-9-2-7-2-j-u-b-u-6-c-0-i-q-a-0-b-8-3-7-q-s-5-f-4-z-g-2-1-m-4-u-o-l-i-n-4-0-r-2-4-z-j-o-w-8-7-2-3-6-3-s-j-3-h-s-u-p-" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Default_Search_URL = "http://8-.p-0-s-6-c-m-5-5-k-z-n-x-5-a-2-8-4-0-q-7-l-8-0-s-8-o-1-d-.5-b-e-n-t-f-p-p-7-1-1-0-7-c-q-0-3-00-6-u-7-t-1-n-y-q-u-f-u.info/1-6-9-u-2-v-u-r-s-u-p-b-m-0-z-3-9-f-2-4-4-4-8-8-8-9-0-6-9-r-f-r-7-j-5-z-6-p-3-5-c-9-s-q-u-4-u-k-q-4-5-h-7-6-0-n-3-9-h-7-b-t-1-3-5-6-5-b-t-7-j-5-7-f-f-6-v-8-9-e-6-3-g-1-t-3-u-k-2-d-0-h-c-9-r-7-8-u-1-2-7-n-x-9-8-x-3-3-x-3-w-8-e-2-r-1-w-7-f-8-7-8-5-q-2-3-9-h-t-0-m-t-0-e-h-y-t-g-3-9-h-h-6-t-n-j-0-t-i-1-6-0-0-3-c-0-8-3-h-1-5-p-y-x-u-9-u-v-6-5-l-6-d-9-o-c-9-9-q-0-j-8-h-1-m-y-8-7-c-g-9-n-5-7-s-8-1-c-6-w-s-9-9-8-7-n-9-e-p-g-q-h-2-z-k-6-2-7-1-9-f-1-0-7-a-t-0-9-p-8-c-h-h-7-b-t-4-h-9-1-8-n-j-7-2-9-g-p-7-c-1-z-4-i-z-c-d-v-1-l-1-4-3-j-p-f-0-5-3-n-v-j-9-9-9-t-5-v-0-3-a-g-2-b-1-0-9-7-e-g-3-5-f-2-u-3-9-5-f-l-8-3-9-0-0-y-8-m-j-9-c-0-k-k-o-4-m-r-2-z-3-2-x-4-z-j-n-4-4-c-t-8-0-f-4-3-k-5-1-1-c-q-6-c-1-8-i-j-r-h-0-a-0-1-z-4-7-1-8-8-5-9-x-8-3-2-o-r-3-f-0-c-8-0-v-6-o-8-x-b-a-2-5-d-3-c-9-8-q-7-b-0-3-5-x-7-8-r-q-e-1-0-a-4-0-4-b-w-u-5-m-v-7-t-2-5-q-3-x-8-a-m-3-a-b-0-c-9-8-u-w-d-9-j-c-q-7-c-m-e-e-3-h-w-e-0-1-p-0-g-e-r-c-5-9-e-c-r-q-l-6-8-m-u-a-j-r-7-2-2-j-t-8-k-q-l-4-k-o-l-x-z-b-q-e-i-2-6-5-s-7-6-n-c-7-k-r-j-x-1-8-d-a-8-f-z-6-8-w-c-u-3-l-8-t-y-k-9-2-w-8-4-w-u-6-7-a-f-e-o-0-9-v-0-6-6-4-3-7-g-s-i-a-6-8-y-m-w-d-r-4-x-b-a-a-0-f-d-j-l-r-g-4-4-j-d-l-4-7-s-1-9-1-3-p-l-n-7-o-6-5-7-a-c-5-t-5-u-6-4-1-4-m-6-h-0-7-u-7-5-k-j-z-g-o-n-6-c-5-2-e-5-9-m-d-6-m-x-7-1-0-9-6-i-8-z-u-8-1-e-t-1-7-o-5-i-0-x-n-v-3-" svchost.exe -
Modifies Internet Explorer start page 1 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Start Page = "http://8-4-f-1-k.-6-m-q-v-1-0-i-.j-z-0-3-0-u-u-x-f-1l-3-l-h-w-b-q-z-u-5-n-l-l-m-s-5-v-s-z-g.info/7-8-l-d-4-2-4-u-f-c-3-0-u-n-7-r-6-a-y-9-2-u-q-2-5-2-3-b-8-4-0-1-q-6-2-5-8-9-9-g-7-5-1-8-8-3-8-s-a-j-1-7-5-m-f-x-x-s-j-j-9-7-y-4-b-p-i-8-5-u-d-1-4-1-8-r-7-2-1-h-0-8-s-q-2-k-n-e-4-l-i-u-1-k-e-3-3-u-b-2-8-8-1-v-4-0-6-s-t-q-w-r-0-8-b-u-r-7-8-2-5-6-5-5-r-5-y-2-5-n-o-f-a-5-2-4-1-6-8-2-2-5-f-a-2-4-i-5-0-7-i-k-j-5-2-y-r-k-4-1-f-b-d-7-2-a-t-f-6-a-r-5-i-l-n-r-8-y-u-a-7-7-3-9-e-4-u-1-l-2-0-o-3-5-0-2-v-o-8-4-2-m-k-v-i-4-z-8-c-5-t-5-8-y-c-9-g-p-h-5-g-4-9-p-i-4-5-9-z-k-u-4-3-i-g-3-5-7-8-u-i-r-3-" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Internet Explorer\Main\Start Page = "http://b-.x-0-.i-k-r-g-1-0-u-5-1-f-3-g-li-9-p-1-x-t-6-g-l-8-m-q-y-s-k-6-l.info/9-1-1-y-3-s-p-a-0-w-7-y-u-5-n-6-6-v-q-j-c-4-b-5-x-l-7-y-0-m-u-2-d-4-2-7-t-y-n-k-b-u-s-x-3-k-3-7-5-5-8-0-5-6-7-5-w-3-5-v-0-w-1-1-i-7-d-i-x-f-m-1-5-7-0-7-i-i-8-k-6-4-9-6-z-b-o-d-5-j-w-u-5-3-2-6-7-f-0-b-0-7-7-n-9-x-8-v-x-5-e-7-a-6-1-5-5-u-v-4-1-8-8-0-7-k-j-9-r-2-1-1-5-7-o-v-3-6-5-i-2-j-5-b-a-4-u-y-l-d-t-7-9-9-v-u-8-0-6-2-j-8-8-8-n-5-1-g-0-2-j-4-7-a-3-5-9-0-0-0-b-j-6-j-d-z-z-3-2-s-m-9-0-o-2-m-h-2-v-0-3-7-l-5-o-s-7-o-y-8-f-1-o-t-6-m-0-1-o-a-b-5-a-h-y-4-s-1-c-i-7-o-l-q-1-8-9-s-0-f-i-9-n-n-2-n-0-j-w-7-8-z-p-u-5-k-3-v-k-f-1-w-2-y-o-0-6-5-2-h-3-w-i-6-1-j-g-8-1-2-8-0-1-4-c-7-h-q-5-x-q-9-7-1-5-4-a-2-1-w-5-6-0-7-f-e-5-9-z-d-e-4-i-1-5-u-v-q-n-1-s-z-p-4-e-4-w-j-a-4-c-e-g-1-j-0-g-v-s-4-5-5-j-e-4-5-4-d-0-7-m-h-c-2-p-0-o-9-4-y-w-y-o-q-5-9-5-0-6-v-b-2-3-i-z-r-5-2-c-u-9-2-k-2-0-0-w-1-2-0-r-k-t-a-8-o-p-2-8-9-6-k-7-p-n-7-g-e-u-r-q-9-8-m-p-h-6-n-6-t-m-w-p-9-9-8-f-d-8-4-l-1-m-8-e-p-3-9-4-9-4-9-3-z-x-6-g-6-3-9-1-g-m-6-6-z-6-s-x-q-3-r-6-7-m-3-k-q-c-k-8-2-8-4-p-b-4-z-q-6-f-6-6-8-4-7-x-6-g-v-f-2-4-f-7-d-8-2-u-x-9-f-6-g-1-j-4-k-s-u-9-4-p-u-n-v-7-i-t-1-w-n-h-3-4-3-9-l-8-t-p-q-2-q-c-j-6-x-3-i-z-h-5-h-7-r-8-k-6-6-3-w-7-a-m-e-n-g-5-y-6-0-9-d-1-x-4-6-5-3-k-0-4-s-6-m-8-n-x-8-g-z-0-9-2-5-y-8-y-g-7-9-6-5-h-6-0-j-9-o-f-z-x-7-i-j-m-g-2-6-z-l-w-o-0-6-p-i-a-7-9-5-7-p-0-3-t-3-a-1-9-f-t-0-1-8-9-l-2-8-1-1-3-j-7-6-5-g-9-q-y-c-t-4-w-2-z-6-5-5-4-p-p-w-m-7-2-m-p-e-3-p-u-l-2-x-2-5-w-a-p-t-x-b-s-e-3-0-8-x-0-4-m-9-1-7-q-3-6-8-3-8-v-6-k-6-w-i-l-j-f-e-v-x-f-9-9-y-4-j-8-g-k-k-4-3-8-2-m-c-" svchost.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 3952 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe Token: SeDebugPrivilege 3952 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe Token: SeDebugPrivilege 3148 winlogon.exe Token: SeBackupPrivilege 1340 svchost.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 3952 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe 3148 winlogon.exe 1340 svchost.exe 1340 svchost.exe 1340 svchost.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 3952 wrote to memory of 3148 3952 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe 87 PID 3952 wrote to memory of 3148 3952 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe 87 PID 3952 wrote to memory of 3148 3952 970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe 87 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88 PID 3148 wrote to memory of 1340 3148 winlogon.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\970fdc305af59de34a6ede26427d54f1_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3952 -
C:\Users\Admin\Admin1\winlogon.exe"C:\Users\Admin\Admin1\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3148 -
C:\Windows\SysWOW64\svchost.exe03⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Drops file in Drivers directory
- Event Triggered Execution: Image File Execution Options Injection
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1340
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
2Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD5970fdc305af59de34a6ede26427d54f1
SHA1fa8129ab356bc4f7f191c34e1550f84bfade1123
SHA2569356e999257918f3fb9360a2ab1e215f775247f6ce3ad05155e3fac2e9a7bbc6
SHA5126c301fe665f2b8334693ca5e2f0aaa3527dd4276e0ce2200b35a5597de2ad799316ebbbcba4e081b9a866c377fe9eda4f2c9dc26ab753751042f2c2ffe61cd10