Analysis
-
max time kernel
54s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
ba3c825ff6bef6116b08f93ba53438d3
-
SHA1
278817cc30e842d66abc1f6427ad0d8fdb212184
-
SHA256
1676096e7b725505b14ec93352e05d7d1a1c95a622d9766e288cfb84f2168354
-
SHA512
ef236bd1b1462aca6df41e6b7146695e74798cea87b6ec457c55c72a5604fa925995530515afb20d823aaec72b9d2fce51d6ad13cf5d7210ba7981999da3405c
-
SSDEEP
12288:Nxrx0r3zEUtNL8YcL5YHaI7XHgZQKhJgeCmdo3zK7LdykEjYnA6lfr:4XbL8iHFLHgZpJEoPdykFnDlz
Malware Config
Signatures
-
Executes dropped EXE 12 IoCs
pid Process 2084 816.#.exe 4292 961.#.exe 1456 290.#.exe 1508 621.#.exe 2772 270.#.exe 4744 921.#.exe 2000 384.#.exe 2408 827.#.exe 1776 421.#.exe 3432 580.#.exe 1536 882.#.exe 2436 733.#.exe -
Adds Run key to start application 2 TTPs 13 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 882.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 290.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 621.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 921.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 827.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 270.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 421.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 733.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 816.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 961.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 384.#.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WinFirewall = "C:\\905c0769f9a06c95a24ddf945\\patcher.exe" 580.#.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ink\TabTip.exe 961.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\ 921.#.exe File opened for modification C:\Program Files\Internet Explorer\de-DE\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\zh-CN\ 816.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\es\ 384.#.exe File opened for modification C:\Program Files\Internet Explorer\uk-UA\ 290.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\ 384.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\de\ 290.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ 270.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\sl-SI\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\en-US\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\Lang\ 290.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\pt-BR\ 290.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\es-ES\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe 290.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\ 827.#.exe File opened for modification C:\Program Files\7-Zip\7zG.exe$ 621.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE 816.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE$ 921.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\fr\ 384.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe 621.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\8.0.2\ja\ 816.#.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\ 827.#.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 816.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\it-IT\ 961.#.exe File opened for modification C:\Program Files\Crashpad\ 921.#.exe File opened for modification C:\Program Files\dotnet\host\ 270.#.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\it-IT\ 621.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\insert\ 621.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\tr-TR\ 921.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\ru-RU\ 827.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\auxpad\ 621.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\MSInfo\fr-FR\ 816.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OfficeSoftwareProtectionPlatform\ 816.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\ 921.#.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\ 270.#.exe File opened for modification C:\Program Files\Crashpad\ 816.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe 290.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\pt-BR\ 961.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\ 384.#.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\WidevineCdm\_platform_specific\ 961.#.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\ 384.#.exe File opened for modification C:\Program Files\Common Files\System\ja-JP\ 621.#.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe 384.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\ 290.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\6.0.27\zh-Hant\ 921.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ 621.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu\ 921.#.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\de-DE\ 270.#.exe File opened for modification C:\Program Files\Internet Explorer\ja-JP\ 816.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\es-ES\ 270.#.exe File opened for modification C:\Program Files\7-Zip\Lang\ 384.#.exe File opened for modification C:\Program Files\Common Files\System\ado\de-DE\ 290.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ 921.#.exe File opened for modification C:\Program Files\Common Files\System\ado\ja-JP\ 384.#.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.WindowsDesktop.App\7.0.16\tr\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\TextConv\en-US\ 921.#.exe File opened for modification C:\Program Files\Common Files\System\ 816.#.exe File opened for modification C:\Program Files\Google\Chrome\Application\ ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7zG.exe 961.#.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ink\nb-NO\ 621.#.exe File opened for modification C:\Program Files\Common Files\System\Ole DB\ja-JP\ 621.#.exe File opened for modification C:\Program Files\Common Files\System\uk-UA\ 961.#.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 421.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 580.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 816.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 961.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 270.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 921.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 290.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 621.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 384.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 827.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 882.#.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 733.#.exe -
NTFS ADS 13 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 290.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 384.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 421.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 580.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 621.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 827.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 270.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 816.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 961.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 921.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 882.#.exe File opened for modification C:\Users\Admin\AppData\Local\Temp\:\systemlog.bak 733.#.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2508 ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe 2084 816.#.exe 4292 961.#.exe 1456 290.#.exe 1508 621.#.exe 2772 270.#.exe 4744 921.#.exe 2000 384.#.exe 2408 827.#.exe 1776 421.#.exe 3432 580.#.exe 1536 882.#.exe 2436 733.#.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2508 wrote to memory of 2084 2508 ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe 87 PID 2508 wrote to memory of 2084 2508 ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe 87 PID 2508 wrote to memory of 2084 2508 ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe 87 PID 2084 wrote to memory of 4292 2084 816.#.exe 92 PID 2084 wrote to memory of 4292 2084 816.#.exe 92 PID 2084 wrote to memory of 4292 2084 816.#.exe 92 PID 4292 wrote to memory of 1456 4292 961.#.exe 93 PID 4292 wrote to memory of 1456 4292 961.#.exe 93 PID 4292 wrote to memory of 1456 4292 961.#.exe 93 PID 1456 wrote to memory of 1508 1456 290.#.exe 95 PID 1456 wrote to memory of 1508 1456 290.#.exe 95 PID 1456 wrote to memory of 1508 1456 290.#.exe 95 PID 1508 wrote to memory of 2772 1508 621.#.exe 98 PID 1508 wrote to memory of 2772 1508 621.#.exe 98 PID 1508 wrote to memory of 2772 1508 621.#.exe 98 PID 2772 wrote to memory of 4744 2772 270.#.exe 99 PID 2772 wrote to memory of 4744 2772 270.#.exe 99 PID 2772 wrote to memory of 4744 2772 270.#.exe 99 PID 4744 wrote to memory of 2000 4744 921.#.exe 100 PID 4744 wrote to memory of 2000 4744 921.#.exe 100 PID 4744 wrote to memory of 2000 4744 921.#.exe 100 PID 2000 wrote to memory of 2408 2000 384.#.exe 101 PID 2000 wrote to memory of 2408 2000 384.#.exe 101 PID 2000 wrote to memory of 2408 2000 384.#.exe 101 PID 2408 wrote to memory of 1776 2408 827.#.exe 102 PID 2408 wrote to memory of 1776 2408 827.#.exe 102 PID 2408 wrote to memory of 1776 2408 827.#.exe 102 PID 1776 wrote to memory of 3432 1776 421.#.exe 105 PID 1776 wrote to memory of 3432 1776 421.#.exe 105 PID 1776 wrote to memory of 3432 1776 421.#.exe 105 PID 3432 wrote to memory of 1536 3432 580.#.exe 106 PID 3432 wrote to memory of 1536 3432 580.#.exe 106 PID 3432 wrote to memory of 1536 3432 580.#.exe 106 PID 1536 wrote to memory of 2436 1536 882.#.exe 108 PID 1536 wrote to memory of 2436 1536 882.#.exe 108 PID 1536 wrote to memory of 2436 1536 882.#.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ba3c825ff6bef6116b08f93ba53438d3_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\816.#.exeC:\Users\Admin\AppData\Local\Temp\816.#.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\961.#.exeC:\Users\Admin\AppData\Local\Temp\961.#.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Users\Admin\AppData\Local\Temp\290.#.exeC:\Users\Admin\AppData\Local\Temp\290.#.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\621.#.exeC:\Users\Admin\AppData\Local\Temp\621.#.exe5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\270.#.exeC:\Users\Admin\AppData\Local\Temp\270.#.exe6⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\921.#.exeC:\Users\Admin\AppData\Local\Temp\921.#.exe7⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\384.#.exeC:\Users\Admin\AppData\Local\Temp\384.#.exe8⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\827.#.exeC:\Users\Admin\AppData\Local\Temp\827.#.exe9⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\421.#.exeC:\Users\Admin\AppData\Local\Temp\421.#.exe10⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\580.#.exeC:\Users\Admin\AppData\Local\Temp\580.#.exe11⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3432 -
C:\Users\Admin\AppData\Local\Temp\882.#.exeC:\Users\Admin\AppData\Local\Temp\882.#.exe12⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\733.#.exeC:\Users\Admin\AppData\Local\Temp\733.#.exe13⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- NTFS ADS
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\46.#.exeC:\Users\Admin\AppData\Local\Temp\46.#.exe14⤵PID:4812
-
C:\Users\Admin\AppData\Local\Temp\928.#.exeC:\Users\Admin\AppData\Local\Temp\928.#.exe15⤵PID:4248
-
C:\Users\Admin\AppData\Local\Temp\57.#.exeC:\Users\Admin\AppData\Local\Temp\57.#.exe16⤵PID:1548
-
C:\Users\Admin\AppData\Local\Temp\694.#.exeC:\Users\Admin\AppData\Local\Temp\694.#.exe17⤵PID:4904
-
C:\Users\Admin\AppData\Local\Temp\695.#.exeC:\Users\Admin\AppData\Local\Temp\695.#.exe18⤵PID:4260
-
C:\Users\Admin\AppData\Local\Temp\71.#.exeC:\Users\Admin\AppData\Local\Temp\71.#.exe19⤵PID:4388
-
C:\Users\Admin\AppData\Local\Temp\949.#.exeC:\Users\Admin\AppData\Local\Temp\949.#.exe20⤵PID:4628
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD59268cd63512d838c006394ad3e2a5cb2
SHA14c73d4e8f853303c1520369e0acadb0d82886c41
SHA2569a406f86c64d5cba2aa0a775c3f0eae97b96cd50200de7518c0b2d54168a0624
SHA5120c953b98451807d8fdc52f63c5262d5a19c5e552baf0b7e4fd695f46b05677c7115ff89a2052e07774e58c0c573ae95a01612ef0b961f15365fdb6091579d505
-
Filesize
1.4MB
MD5ba3c825ff6bef6116b08f93ba53438d3
SHA1278817cc30e842d66abc1f6427ad0d8fdb212184
SHA2561676096e7b725505b14ec93352e05d7d1a1c95a622d9766e288cfb84f2168354
SHA512ef236bd1b1462aca6df41e6b7146695e74798cea87b6ec457c55c72a5604fa925995530515afb20d823aaec72b9d2fce51d6ad13cf5d7210ba7981999da3405c