Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21/08/2024, 19:03
Static task
static1
Behavioral task
behavioral1
Sample
b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe
-
Size
119KB
-
MD5
b4a92f0eff02fdde0d1c222b7186865d
-
SHA1
17e3c026f464471687a217e4ada215fd06b3fe26
-
SHA256
d594dee438f8177f235385b07c370a9f11209ddf652218ae6571623247c23273
-
SHA512
1cce00dbc64e8a48dcdcd4e3341c752dd9d1cc34782c0fb7b1324e5b502995e698e83f7ace06cf04ee4efd2e3368af1786eb85bd5b0ab14c03df8fa5d07a1550
-
SSDEEP
3072:Lf2NJlrelZSlwHvmTKcfhjFtyot72VtGlIAOxJV:KJlqluwmG+5ootS+nOxT
Malware Config
Signatures
-
Renames multiple (216) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 4260 Logo1_.exe 1156 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe -
Loads dropped DLL 2 IoCs
pid Process 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 4260 Logo1_.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk-1.8\bin\kinit.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\rmiregistry.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\jjs.exe.Exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.Xbox.TCUI_1.23.28002.0_x64__8wekyb3d8bbwe\TCUI-App.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32Info.exe.Exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeBackgroundHost.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeUpdate.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\pack200.exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DW20.EXE.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeUpdateOnDemand.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\jabswitch.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.MicrosoftSolitaireCollection_4.4.8204.0_x64__8wekyb3d8bbwe\Microsoft.MicrosoftSolitaireCollection.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_79609\java.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\notification_helper.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\keytool.exe.Exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.SkypeApp_14.53.77.0_x64__kzf8qxf38zg5c\SkypeApp.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.StorePurchaseApp_11811.1001.18.0_x64__8wekyb3d8bbwe\StoreExperienceHost.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeUpdate.exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\jps.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\policytool.exe.Exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\Client\AppVDllSurrogate64.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\DW\DWTRIG20.EXE.Exe Logo1_.exe File opened for modification C:\Program Files\Mozilla Firefox\crashreporter.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\jre\bin\tnameserv.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\ktab.exe.Exe Logo1_.exe File created C:\Program Files\Java\jre-1.8\bin\pack200.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\pi_brokers\32BitMAPIBroker.exe.Exe Logo1_.exe File created C:\Program Files (x86)\Google\Update\DisabledGoogleUpdate.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\BHO\ie_to_edge_stub.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\Installer\setup.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\klist.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\Office16\WINWORD.EXE.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\arh.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\bin\javaws.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOICONS.EXE Logo1_.exe File created C:\Program Files (x86)\Google\Update\1.3.36.371\GoogleUpdate.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedgewebview2.exe.Exe Logo1_.exe File created C:\Program Files\Microsoft Office 15\ClientX64\IntegratedOffice.exe.Exe Logo1_.exe File created C:\Program Files\Mozilla Firefox\pingsender.exe.Exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstaller.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.WindowsCamera_2018.826.98.0_x64__8wekyb3d8bbwe\WindowsCamera.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.XboxSpeechToTextOverlay_1.17.29001.0_x64__8wekyb3d8bbwe\SpeechToTextOverlay64-Retail.exe Logo1_.exe File opened for modification C:\Program Files\WindowsApps\Microsoft.YourPhone_0.19051.7.0_x64__8wekyb3d8bbwe\YourPhone.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe.Exe Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\bin\rmid.exe.Exe Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\unpack200.exe.Exe Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Office\Office16\DCF\Common.ShowHelp.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_proxy.exe.Exe Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\EdgeUpdate_bk\1.3.195.15\MicrosoftEdgeUpdateComRegisterShell64.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jcmd.exe Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\servertool.exe Logo1_.exe File created C:\Program Files (x86)\Microsoft\Edge\Application\92.0.902.67\msedge_proxy.exe.Exe Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\RichDll.dll Logo1_.exe File created C:\Windows\uninstall\rundl132.exe b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe File created C:\Windows\Logo1_.exe b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe File opened for modification C:\Windows\uninstall\rundl132.exe Logo1_.exe -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe 4260 Logo1_.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe Token: SeDebugPrivilege 4260 Logo1_.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 3128 wrote to memory of 1356 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 87 PID 3128 wrote to memory of 1356 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 87 PID 3128 wrote to memory of 3772 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 88 PID 3128 wrote to memory of 3772 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 88 PID 3128 wrote to memory of 3772 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 88 PID 3772 wrote to memory of 4876 3772 net.exe 90 PID 3772 wrote to memory of 4876 3772 net.exe 90 PID 3772 wrote to memory of 4876 3772 net.exe 90 PID 3128 wrote to memory of 1672 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 92 PID 3128 wrote to memory of 1672 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 92 PID 3128 wrote to memory of 1672 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 92 PID 3128 wrote to memory of 4260 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 93 PID 3128 wrote to memory of 4260 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 93 PID 3128 wrote to memory of 4260 3128 b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe 93 PID 1672 wrote to memory of 1156 1672 cmd.exe 95 PID 1672 wrote to memory of 1156 1672 cmd.exe 95 PID 1672 wrote to memory of 1156 1672 cmd.exe 95 PID 4260 wrote to memory of 4792 4260 Logo1_.exe 96 PID 4260 wrote to memory of 4792 4260 Logo1_.exe 96 PID 4260 wrote to memory of 2060 4260 Logo1_.exe 97 PID 4260 wrote to memory of 2060 4260 Logo1_.exe 97 PID 4260 wrote to memory of 2060 4260 Logo1_.exe 97 PID 2060 wrote to memory of 4092 2060 net.exe 99 PID 2060 wrote to memory of 4092 2060 net.exe 99 PID 2060 wrote to memory of 4092 2060 net.exe 99 PID 4260 wrote to memory of 4076 4260 Logo1_.exe 100 PID 4260 wrote to memory of 4076 4260 Logo1_.exe 100 PID 4260 wrote to memory of 4076 4260 Logo1_.exe 100 PID 4076 wrote to memory of 5032 4076 net.exe 102 PID 4076 wrote to memory of 5032 4076 net.exe 102 PID 4076 wrote to memory of 5032 4076 net.exe 102 PID 4260 wrote to memory of 1356 4260 Logo1_.exe 87 PID 4260 wrote to memory of 1356 4260 Logo1_.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1356
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8184.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b4a92f0eff02fdde0d1c222b7186865d_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1156
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe2⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:4792
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4092
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4076 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:5032
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
638KB
MD513f11e77e43ed7208c13eb3544e79976
SHA15a5d414c2073fa20480e0bb4beb635819748cf4a
SHA2569327eff035a0bdd4bee21b328cbfb601e76c22ab210ea637481a6eed65a08f87
SHA5127ca037256c31fda9c86d9bdf85e3aeb1daf710c705368431abfaf9eadaa454da8d36d26ae4b51e1fa7a2aabd2d32ae7ac60754f647cc7f0da3be841796b65ac4
-
Filesize
614B
MD5bca0e775c625b7bbd1101789bee132cc
SHA1651db1d79c6b15b9e745ca9a9c298d8269870620
SHA256d306052273a2da6712575f0a4afb6233b446a978b1f27e897fb3626b25f7bf63
SHA5129e24c313bea12cbb968b945e9f6d6522570f387eefe04a39060a07311ae19c255141402c8d2cd8bbcf87d4c9af934b3694e6ed658bcb95ce706cb00c12db91b5
-
Filesize
25KB
MD531918070aff5a96453c3d867dd3c0ef6
SHA1c8735d8175a49cfd5e72a1719d6c6cd7c85f9729
SHA256b62fd03a4d21a5fc979113adff64c341855666bb45d7c3f833a5a39eb6ea0a9c
SHA5125a287ef253f07a80b61cf8c3aa1d0bba6173d7ccf421c0bb66e006bd0692358f8379c7d1621d9c96c788a18bd36dd8f4852b1341d24aca5bd26b519708facba1
-
Filesize
25KB
MD56ff84be315cfafbbdf36aa01af8389e7
SHA12c550a4059ac331f5f5c9d3f218e0f6184aa27c9
SHA25647c67c1c88ceaee3cf1667bf956a3e11a84dea2f7c2afc634777aa5f1bf65c76
SHA51272498b009573a9cc9b5554e61d56b68f273682bfa2e13808f4abd5b2171aa59dd4a64bd9f68a3a416cfaceacb0041df918d8a84f28a5fa7f204fc562c5b6b174
-
Filesize
94KB
MD53b03a45e7bdde2ac8987049c069d8971
SHA13f9b4eb2c73868bf931c262daf2cc0f85e8410a4
SHA2565a894c6ca18c01fe02c788ad19f2bb699cdef217f20efd43e1f9b58f4f30b6e5
SHA512ee9b43f621a8ee5c70a599cfb7ba24b1461020dd2a89cf393ed5201f1e5b32b6b95f2e83aeef60932018b4067abae018d32cd48c79e62344d184a20f97b1fd4a
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47