Analysis
-
max time kernel
149s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 00:08
Static task
static1
Behavioral task
behavioral1
Sample
b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe
-
Size
164KB
-
MD5
b99a2aca682af780d42ea5e58673da48
-
SHA1
6e39828a6555c02bd12bea3d8a1170fedb9dd39f
-
SHA256
11c4690549a25b759ecd9d25382d3e8683f6e880d46c8dd04a74a866edd28eb4
-
SHA512
1e5e108f7dfbfca31ca2d34bcab6bd476b99b73b9e5d8ad43ed270ac9ac98dfec227f7e7a53706c427548e0e1a7779c5c2bf46d49e2752b139621ec50284ef5c
-
SSDEEP
3072:YbGZ/3I5HwD0EcfxSZxTwZn3fT2fP2d67tPmFsp2MdYDluW1Sgs10MtNXFokMDvi:YCZ/3sHw0Ecfwu3fL/6EluW1Psv
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Logo1_.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Word\STARTUP\_desktop.ini Logo1_.exe -
Executes dropped EXE 2 IoCs
pid Process 516 Logo1_.exe 412 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load = "C:\\Windows\\uninstall\\rundl132.exe" Logo1_.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: Logo1_.exe File opened (read-only) \??\X: Logo1_.exe File opened (read-only) \??\V: Logo1_.exe File opened (read-only) \??\R: Logo1_.exe File opened (read-only) \??\I: Logo1_.exe File opened (read-only) \??\Z: Logo1_.exe File opened (read-only) \??\Q: Logo1_.exe File opened (read-only) \??\O: Logo1_.exe File opened (read-only) \??\W: Logo1_.exe File opened (read-only) \??\U: Logo1_.exe File opened (read-only) \??\T: Logo1_.exe File opened (read-only) \??\P: Logo1_.exe File opened (read-only) \??\N: Logo1_.exe File opened (read-only) \??\M: Logo1_.exe File opened (read-only) \??\L: Logo1_.exe File opened (read-only) \??\K: Logo1_.exe File opened (read-only) \??\J: Logo1_.exe File opened (read-only) \??\E: Logo1_.exe File opened (read-only) \??\S: Logo1_.exe File opened (read-only) \??\H: Logo1_.exe File opened (read-only) \??\G: Logo1_.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\WindowsPowerShell\Modules\Microsoft.PowerShell.Operation.Validation\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\Pester\3.4.0\bin\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\nl-nl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\fr-fr\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\viewer\nls\en-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Common Files\Microsoft Shared\VGX\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe Logo1_.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-files\js\nls\he-il\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer-select\js\nls\sl-si\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jre-1.8\lib\fonts\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Windows Photo Viewer\es-ES\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\pt-BR\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\app-center\js\nls\sv-se\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\EQUATION\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\co\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\oc\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\en-il\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\app\dev\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\my-computer\js\nls\zh-cn\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\sign-services-auth\js\nls\ar-ae\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\signatures\js\nls\ar-ae\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Internet Explorer\iexplore.exe Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\css\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\ui-lightness\_desktop.ini Logo1_.exe File created C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\MSFT_PackageManagementSource\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\combinepdf\js\nls\en-gb\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\scan-files\js\nls\fi-fi\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\send-for-sign\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\pl-pl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jre-1.8\bin\rmid.exe Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\createpdfupsell-app\js\nls\da-dk\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\nn\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\zu\LC_MESSAGES\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\sl-sl\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\add-account\js\nls\zh-tw\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\images\themes\dark\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\img\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\ro-ro\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OFFICE16\MSOXMLED.EXE Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\tool\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\js\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Windows Photo Viewer\it-IT\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\WindowsPowerShell\Modules\PackageManagement\1.0.0.1\DSCResources\fr-FR\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\files\dev\nls\pt-br\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\digsig\js\nls\sl-sl\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\tracked-send\js\plugins\tracked-send\js\nls\hu-hu\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\uss-search\js\nls\nl-nl\_desktop.ini Logo1_.exe File created C:\Program Files\Java\jdk-1.8\jre\lib\amd64\_desktop.ini Logo1_.exe File created C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\locale\ml\LC_MESSAGES\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\css\files\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\generic-rhp-app\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\on-boarding\js\nls\zh-tw\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\task-handler\js\nls\da-dk\_desktop.ini Logo1_.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\unified-share\js\nls\fr-fr\_desktop.ini Logo1_.exe File created C:\Program Files\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\THEMES16\SPRING\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\Java\jdk-1.8\legal\javafx\_desktop.ini Logo1_.exe File created C:\Program Files\VideoLAN\VLC\lua\http\css\_desktop.ini Logo1_.exe File created C:\Program Files\dotnet\host\fxr\8.0.2\_desktop.ini Logo1_.exe File opened for modification C:\Program Files\VideoLAN\VLC\locale\ff\_desktop.ini Logo1_.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\WebResources\Resource0\static\js\plugins\fss\js\nls\eu-es\_desktop.ini Logo1_.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\uninstall\rundl132.exe Logo1_.exe File created C:\Windows\Dll.dll Logo1_.exe File created C:\Windows\uninstall\rundl132.exe b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe File created C:\Windows\Logo1_.exe b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 9 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Logo1_.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe 516 Logo1_.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 4336 wrote to memory of 1800 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 84 PID 4336 wrote to memory of 1800 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 84 PID 4336 wrote to memory of 1800 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 84 PID 1800 wrote to memory of 4392 1800 net.exe 86 PID 1800 wrote to memory of 4392 1800 net.exe 86 PID 1800 wrote to memory of 4392 1800 net.exe 86 PID 4336 wrote to memory of 4524 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 90 PID 4336 wrote to memory of 4524 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 90 PID 4336 wrote to memory of 4524 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 90 PID 4336 wrote to memory of 516 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 92 PID 4336 wrote to memory of 516 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 92 PID 4336 wrote to memory of 516 4336 b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe 92 PID 516 wrote to memory of 4788 516 Logo1_.exe 93 PID 516 wrote to memory of 4788 516 Logo1_.exe 93 PID 516 wrote to memory of 4788 516 Logo1_.exe 93 PID 4788 wrote to memory of 4384 4788 net.exe 95 PID 4788 wrote to memory of 4384 4788 net.exe 95 PID 4788 wrote to memory of 4384 4788 net.exe 95 PID 4524 wrote to memory of 412 4524 cmd.exe 96 PID 4524 wrote to memory of 412 4524 cmd.exe 96 PID 4524 wrote to memory of 412 4524 cmd.exe 96 PID 516 wrote to memory of 468 516 Logo1_.exe 97 PID 516 wrote to memory of 468 516 Logo1_.exe 97 PID 516 wrote to memory of 468 516 Logo1_.exe 97 PID 468 wrote to memory of 1460 468 net.exe 99 PID 468 wrote to memory of 1460 468 net.exe 99 PID 468 wrote to memory of 1460 468 net.exe 99 PID 516 wrote to memory of 3372 516 Logo1_.exe 55 PID 516 wrote to memory of 3372 516 Logo1_.exe 55
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3372
-
C:\Users\Admin\AppData\Local\Temp\b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$a8FAD.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4524 -
C:\Users\Admin\AppData\Local\Temp\b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b99a2aca682af780d42ea5e58673da48_JaffaCakes118.exe"4⤵
- Executes dropped EXE
PID:412
-
-
-
C:\Windows\Logo1_.exeC:\Windows\Logo1_.exe3⤵
- Drops file in Drivers directory
- Drops startup file
- Executes dropped EXE
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:4384
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Kingsoft AntiVirus Service"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:468 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Kingsoft AntiVirus Service"5⤵
- System Location Discovery: System Language Discovery
PID:1460
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
632KB
MD52e7b41bf309ddb424c6de836559e4d5c
SHA1923e5eec25ab81af277a634e97b166d78846399a
SHA256345b3e5ba6750d9cde70c7b137cf18d9324c9f13546d49813b616a67482f7ee6
SHA512b0fa128af3f6d44e9971ab1caa4ad4f2530b2100d5ff436f98440cf02b6d9835a3e3271c8b1ae16084b85f19fe81d9b4d34c1aaec8d656b65c378cd31ae86a53
-
Filesize
614B
MD5c533490ac68c4df150b1c21f290f4134
SHA152b497e90d003296df09c75c4a2eecf84ff2fbf9
SHA2565b0502b9a145d6ecf53ba71f3468e292da5f06f8eb177fe9f0b26a1725045add
SHA5127d8e739447450131883359864fe48a31929b194cbe0ee34670799846a04911f2a485999962560459bf4dee1b92cba7b49620231d46abe6247284bcbef15e44b8
-
Filesize
76KB
MD5ab74aa8defc1ca82759788a55b673629
SHA164eaa5f6cc51635124674c4439ac34f7dd46bc13
SHA256f6888f5a134294c2ed1be85357f1a7bf2eee9653251aa63271bb6e570caffc6a
SHA512b54507a8d5086eb293bdc452b131cab1e5f3d9c92429b5d22ed82ff14386038eb903d1babdea95c16134771906329f40fcfbf3aad4b7fccddd0a417b147718b3
-
Filesize
88KB
MD54500649708c2ca51412703610451b44f
SHA13995956ecdfed936555526230a0fd35f96eaa3ce
SHA256f573b56af42f2270c2125ae682308ef08e3e42c3200bd5a08c0734d2a945ceb0
SHA51205b4e50e2bb5f634c9090354cb518f615bc734582d96992539a83d1e169c265a274b28c31e24df5992e10372c6775db0fcbad49adbcdeb52291d12a7a23ea716
-
Filesize
842B
MD56f4adf207ef402d9ef40c6aa52ffd245
SHA14b05b495619c643f02e278dede8f5b1392555a57
SHA256d9704dab05e988be3e5e7b7c020bb9814906d11bb9c31ad80d4ed1316f6bc94e
SHA512a6306bd200a26ea78192ae5b00cc49cfab3fba025fe7233709a4e62db0f9ed60030dce22b34afe57aad86a098c9a8c44e080cedc43227cb87ef4690baec35b47
-
Filesize
9B
MD5ea1fdd6264971a0921c1b04845297702
SHA1a0af652ae24bbe3fe4f6ae191acb15a920d5f28d
SHA25685cc4584bb51256e8fcd5ef0a9e280d1abf4df2e02e7ed91e736fcf64b380728
SHA5128be806db19abd1f0d6bb38c65726f738a4f8dd9d0b3de9e648ea317f6a2db85640ad02da6392a5db7fde8dfbf24718d22508507a78cbb0892c52bc3c72114cf5