Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 08:47
Static task
static1
Behavioral task
behavioral1
Sample
ae929ed213a21693e756f1d1e371fa2f_JaffaCakes118.dll
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ae929ed213a21693e756f1d1e371fa2f_JaffaCakes118.dll
Resource
win10v2004-20240802-en
General
-
Target
ae929ed213a21693e756f1d1e371fa2f_JaffaCakes118.dll
-
Size
339KB
-
MD5
ae929ed213a21693e756f1d1e371fa2f
-
SHA1
e053b8d49a084174667b88c11dad8df4db5db475
-
SHA256
732c1087609d0caefc85dcbe690beb80dc8446fe0174e764d1ae70d26585e2a2
-
SHA512
9041f521590c6938e9efa434a37682caa0f5e7427a59c2214a82b93f6c076cd500348d3eb6ac37e8d8abcbeda250ccecd25847d1639730c49ed522708cf4c630
-
SSDEEP
6144:OL49uYqfNWE/4rcPmsgeRwOuweho3ariB3Ndzj6CpYUmmN2vPaUzW4:VBqFX/2cPMtWq2bWCpYU0O4
Malware Config
Signatures
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\drivers\etc\hosts 36bd.exe -
Executes dropped EXE 4 IoCs
pid Process 2636 36bd.exe 2624 36bd.exe 2464 36bd.exe 1640 mtv.exe -
Loads dropped DLL 45 IoCs
pid Process 2908 regsvr32.exe 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 2108 rundll32.exe 2464 36bd.exe 2108 rundll32.exe 2108 rundll32.exe 2696 rundll32.exe 2696 rundll32.exe 2696 rundll32.exe 2696 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 1612 rundll32.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe 2464 36bd.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{63035881-A749-4139-9CAB-82DCFFA7F106} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{63035881-A749-4139-9CAB-82DCFFA7F106}\ regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 3 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 rundll32.exe File opened for modification \??\PhysicalDrive0 36bd.exe File opened for modification \??\PhysicalDrive0 rundll32.exe -
Drops file in System32 directory 20 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat rundll32.exe File opened for modification C:\Windows\SysWOW64\bba6.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\c6cb.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\36bd.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\b33o.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\s.exe mtv.exe File opened for modification C:\Windows\SysWOW64\3ce8.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\4bl4.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\36be.dll rundll32.exe File created C:\Windows\SysWOW64\00f rundll32.exe File opened for modification C:\Windows\SysWOW64\b33o.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\36ud.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\c6cb.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\c35s.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\353r.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\353r.dlltmp rundll32.exe File opened for modification C:\Windows\SysWOW64\4bl4.dll rundll32.exe File opened for modification C:\Windows\SysWOW64\b3rc.exe rundll32.exe File opened for modification C:\Windows\SysWOW64\b33d.exe rundll32.exe File created C:\Windows\SysWOW64\`รต-111-6669-29 rundll32.exe -
Drops file in Windows directory 13 IoCs
description ioc Process File created C:\Windows\Tasks\ms.job rundll32.exe File opened for modification C:\Windows\b3cd.exe rundll32.exe File opened for modification C:\Windows\d48d.exe rundll32.exe File opened for modification C:\Windows\3cdd.flv rundll32.exe File opened for modification C:\Windows\cd4u.bmp rundll32.exe File opened for modification C:\Windows\cd4d.exe rundll32.exe File opened for modification C:\Windows\cd4d.flv rundll32.exe File opened for modification C:\Windows\480.exe rundll32.exe File opened for modification C:\Windows\436b.flv rundll32.exe File opened for modification C:\Windows\80a.bmp rundll32.exe File opened for modification C:\Windows\d48.flv rundll32.exe File opened for modification C:\Windows\0acu.bmp rundll32.exe File opened for modification C:\Windows\b5b3.bmp rundll32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36bd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mtv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Modifies registry class 47 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CurVer\ = "BHO.TttPlayer.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\Programmable regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\ = "ITttPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\CLSID\ = "{63035881-A749-4139-9CAB-82DCFFA7F106}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\FLAGS regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\ = "CTttPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CLSID\ = "{63035881-A749-4139-9CAB-82DCFFA7F106}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\TypeLib\ = "{3B979AB3-29C8-4DC3-829A-E066DDFEA096}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\TypeLib\ = "{3B979AB3-29C8-4DC3-829A-E066DDFEA096}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\AppID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\ = "ITttPlayer" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\ = "CTttPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\ProgID\ = "BHO.TttPlayer.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\VersionIndependentProgID\ = "BHO.TttPlayer" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\InprocServer32\ThreadingModel = "apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\TypeLib\ = "{3B979AB3-29C8-4DC3-829A-E066DDFEA096}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\b33o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\BHO.TttPlayer.1\ = "CTttPlayer Object" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\ = "BHO 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{939FF0D3-FE01-4326-B7B6-0ADBE9FE6FD9}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{63035881-A749-4139-9CAB-82DCFFA7F106}\InprocServer32\ = "C:\\Windows\\SysWow64\\b33o.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{3B979AB3-29C8-4DC3-829A-E066DDFEA096}\1.0\0 regsvr32.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2464 36bd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1640 mtv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2536 wrote to memory of 2108 2536 rundll32.exe 30 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2804 2108 rundll32.exe 31 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2820 2108 rundll32.exe 32 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2824 2108 rundll32.exe 33 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2888 2108 rundll32.exe 34 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2908 2108 rundll32.exe 35 PID 2108 wrote to memory of 2636 2108 rundll32.exe 36 PID 2108 wrote to memory of 2636 2108 rundll32.exe 36 PID 2108 wrote to memory of 2636 2108 rundll32.exe 36 PID 2108 wrote to memory of 2636 2108 rundll32.exe 36 PID 2108 wrote to memory of 2624 2108 rundll32.exe 38 PID 2108 wrote to memory of 2624 2108 rundll32.exe 38 PID 2108 wrote to memory of 2624 2108 rundll32.exe 38 PID 2108 wrote to memory of 2624 2108 rundll32.exe 38 PID 2108 wrote to memory of 1640 2108 rundll32.exe 41 PID 2108 wrote to memory of 1640 2108 rundll32.exe 41 PID 2108 wrote to memory of 1640 2108 rundll32.exe 41 PID 2108 wrote to memory of 1640 2108 rundll32.exe 41 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2464 wrote to memory of 2696 2464 36bd.exe 42 PID 2108 wrote to memory of 1612 2108 rundll32.exe 43 PID 2108 wrote to memory of 1612 2108 rundll32.exe 43 PID 2108 wrote to memory of 1612 2108 rundll32.exe 43
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae929ed213a21693e756f1d1e371fa2f_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\ae929ed213a21693e756f1d1e371fa2f_JaffaCakes118.dll,#12⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/4bl4.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2804
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/c6cb.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2820
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/353r.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /u /s "C:\Windows\system32/b33o.dll"3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\regsvr32.exeC:\Windows\system32\regsvr32.exe /s "C:\Windows\system32/b33o.dll"3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2908
-
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\system32/36bd.exe -i3⤵
- Executes dropped EXE
PID:2636
-
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\system32/36bd.exe -s3⤵
- Executes dropped EXE
PID:2624
-
-
C:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exeC:\Users\Admin\AppData\Local\Temp\h8nil4o8\mtv.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/36be.dll, Always3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1612
-
-
-
C:\Windows\SysWOW64\36bd.exeC:\Windows\SysWOW64\36bd.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\rundll32.exeC:\Windows\system32\rundll32 C:\Windows\system32/36be.dll,Always2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2696
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
67KB
MD58cdc873c0629afa3b392b231849230de
SHA17fc0868248e0c72a25b9f2dcbbd541537ab4e018
SHA256b1f839c50341af463a0f165ee65bea649692c82ced33bf4bbbb2a40e6190e254
SHA51221502462ba27b5548d53b8e7829ddbacc47552260552854fb5305cbf1302e928c60e20cd82c776e336f26126019d4a9ea65c3968515bdef4734d9e5d94da4332
-
Filesize
178KB
MD55819ba57bdb4b225529d6aa9fa1b9726
SHA17ed4a4e1b82df6080ddafda20ae0f606eedc1eb4
SHA256dfef78b03c47b13c891ca6079534422e5913d8b13ebb66865db89dfad6b6db1e
SHA512f6635fd4a5f7f3f0a172eac1ad9b87301df2a9bc98bb4f34f72c1addc5e29f438e05dbee4546dc6a4e82871b8e3058dfb41e65b7baaccd8aadc8f5ee09517d93
-
Filesize
216KB
MD5beb77a3a4321e6aa0db9e4806ca0b404
SHA135aa63000f3e5ad34036b460d14b864e57fe4217
SHA2566a11e2307552a6cabd20c9b486e7888591d9ef4dced2f8ce21c1b1a31d9e52b0
SHA512e6ef8e9d51e860c697179a4892876cbbf7047a1456a89c1865b72dcd6872803cea1c20b4a50f201a88b2547604df864dfe003daaa89c55a4c422030517822a7c
-
Filesize
116KB
MD51fbbc7ac29b085b431309615f59384b3
SHA1e473b19432907ebff226084a5b5f85a9150aa0e2
SHA25694a4ce11dc4ae8a5952ff6ca3ecd0845778576cb352d1e5d93c06253adadc305
SHA5126ecb01361fcb1b7464c007236583a79100ce80e10a0b9ab5304b48ec1ed6572d12ddff2da5c7ce1f3d375a9430da8764932618ee31ede01dbe88b0b808d342a0
-
Filesize
100KB
MD5e892a2a9c083204275eec3c2cb765441
SHA1a0c4ac689f3ab82f7fb5f8229e17818f3526e6f4
SHA256de7c9eefabb49beff86879694e77451371bcc782ecfc20fb6ebe36ada8fb8fc9
SHA512f81d69d23511dec4423795fac54f61fc89a49feec6e0bc93af2f43953b093457e75be1c71a40b338889bdceb7b06003dd4162394adbb612dc41c49d97990f98b