Analysis

  • max time kernel
    149s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    24/08/2024, 01:07 UTC

General

  • Target

    bdb667f12e906f4d6e235124f8bc11f0_JaffaCakes118.exe

  • Size

    4.9MB

  • MD5

    bdb667f12e906f4d6e235124f8bc11f0

  • SHA1

    b12cd62e9564236637a2cf0ce02ac192299bc83e

  • SHA256

    f6906e2636e05a8f894282cd4c824d53273aab85d82c3a7e9a8e2543882c4d96

  • SHA512

    bdaa815b813ecdef785a45987f6b9f44ccb1ef87f1ea143be60c83f7aa0f2aaa33a2ed6cc1e8f8d52111bf4cf6f7e6aa2dc55106b96f4ebfa264502d01f33819

  • SSDEEP

    98304:NrQZWrQZlrQZWrQZlrQZWrQZlrQZWrQZlrQZWrQZ8:Nr2Wr2lr2Wr2lr2Wr2lr2Wr2lr2Wr28

Malware Config

Signatures

  • Disables service(s) 3 TTPs
  • Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
  • Blocks application from running via registry modification 17 IoCs

    Adds application to list of disallowed applications.

  • Event Triggered Execution: Image File Execution Options Injection 1 TTPs 20 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Indicator Removal: File Deletion 1 TTPs

    Adversaries may delete files left behind by the actions of their intrusion activity.

  • Network Share Discovery 1 TTPs

    Attempt to gather information on host network.

  • Drops autorun.inf file 1 TTPs 2 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Drops file in System32 directory 4 IoCs
  • Drops file in Program Files directory 31 IoCs
  • Drops file in Windows directory 10 IoCs
  • Launches sc.exe 8 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Time Discovery 1 TTPs 6 IoCs

    Adversary may gather the system time and/or time zone settings from a local or remote system.

  • Runs net.exe
  • Runs regedit.exe 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdb667f12e906f4d6e235124f8bc11f0_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bdb667f12e906f4d6e235124f8bc11f0_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in System32 directory
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1532
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c C:\Windows\system32\Option.bat
      2⤵
        PID:2144
      • C:\Windows\SysWOW64\net.exe
        net.exe start schedule /y
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2172
        • C:\Windows\SysWOW64\net1.exe
          C:\Windows\system32\net1 start schedule /y
          3⤵
            PID:1720
        • C:\Windows\SysWOW64\At.exe
          At.exe 1:11:02 AM C:\Windows\Help\HelpCat.exe
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1992
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c at 1:10:04 AM C:\Windows\Sysinf.bat
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Windows\SysWOW64\at.exe
            at 1:10:04 AM C:\Windows\Sysinf.bat
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3040
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c at 1:13:04 AM C:\Windows\Sysinf.bat
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2912
          • C:\Windows\SysWOW64\at.exe
            at 1:13:04 AM C:\Windows\Sysinf.bat
            3⤵
            • System Location Discovery: System Language Discovery
            PID:2616
        • C:\Windows\SysWOW64\net.exe
          net.exe stop wscsvc /y
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1996
          • C:\Windows\SysWOW64\net1.exe
            C:\Windows\system32\net1 stop wscsvc /y
            3⤵
              PID:2632
          • C:\Windows\SysWOW64\net.exe
            net.exe stop sharedaccess /y
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:2740
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop sharedaccess /y
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2620
          • C:\Windows\SysWOW64\net.exe
            net.exe stop wuauserv /y
            2⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of WriteProcessMemory
            PID:3060
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 stop wuauserv /y
              3⤵
              • System Location Discovery: System Language Discovery
              PID:2848
          • C:\Windows\SysWOW64\net.exe
            net.exe stop srservice /y
            2⤵
              PID:2732
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop srservice /y
                3⤵
                • System Location Discovery: System Language Discovery
                PID:1184
            • C:\Windows\SysWOW64\net.exe
              net.exe stop 360timeprot /y
              2⤵
              • System Time Discovery
              PID:2692
              • C:\Windows\SysWOW64\net1.exe
                C:\Windows\system32\net1 stop 360timeprot /y
                3⤵
                • System Location Discovery: System Language Discovery
                • System Time Discovery
                PID:2484
            • C:\Windows\SysWOW64\sc.exe
              C:\Windows\system32\sc.exe config srservice start= disabled
              2⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2604
            • C:\Windows\SysWOW64\sc.exe
              C:\Windows\system32\sc.exe config SharedAccess start= disabled
              2⤵
              • Launches sc.exe
              PID:2800
            • C:\Windows\SysWOW64\sc.exe
              C:\Windows\system32\sc.exe config wscsvc start= disabled
              2⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2624
            • C:\Windows\SysWOW64\sc.exe
              C:\Windows\system32\sc.exe config srservice start= disabled
              2⤵
              • Launches sc.exe
              • System Location Discovery: System Language Discovery
              PID:2652
            • C:\Windows\SysWOW64\regedit.exe
              regedit.exe /s C:\Windows\regedt32.sys
              2⤵
              • Modifies visibility of file extensions in Explorer
              • Blocks application from running via registry modification
              • Event Triggered Execution: Image File Execution Options Injection
              • Runs regedit.exe
              PID:2520
            • C:\Windows\SysWOW64\reg.exe
              C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
              2⤵
                PID:2976
              • C:\Windows\SysWOW64\reg.exe
                C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                2⤵
                • System Location Discovery: System Language Discovery
                PID:3016
              • C:\Windows\system\KavUpda.exe
                C:\Windows\system\KavUpda.exe
                2⤵
                • Executes dropped EXE
                • Drops autorun.inf file
                • Drops file in System32 directory
                • Drops file in Windows directory
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                PID:1736
                • C:\Windows\SysWOW64\cmd.exe
                  cmd /c C:\Windows\system32\Option.bat
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:2460
                • C:\Windows\SysWOW64\net.exe
                  net.exe start schedule /y
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1776
                  • C:\Windows\SysWOW64\net1.exe
                    C:\Windows\system32\net1 start schedule /y
                    4⤵
                      PID:1752
                  • C:\Windows\SysWOW64\At.exe
                    At.exe 1:11:06 AM C:\Windows\Help\HelpCat.exe
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2036
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c at 1:10:08 AM C:\Windows\Sysinf.bat
                    3⤵
                    • System Location Discovery: System Language Discovery
                    PID:2392
                    • C:\Windows\SysWOW64\at.exe
                      at 1:10:08 AM C:\Windows\Sysinf.bat
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2356
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd /c at 1:13:08 AM C:\Windows\Sysinf.bat
                    3⤵
                      PID:2304
                      • C:\Windows\SysWOW64\at.exe
                        at 1:13:08 AM C:\Windows\Sysinf.bat
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:1300
                    • C:\Windows\SysWOW64\net.exe
                      net.exe stop wscsvc /y
                      3⤵
                      • System Location Discovery: System Language Discovery
                      PID:1624
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 stop wscsvc /y
                        4⤵
                          PID:2160
                      • C:\Windows\SysWOW64\net.exe
                        net.exe stop sharedaccess /y
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:308
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop sharedaccess /y
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:1140
                      • C:\Windows\SysWOW64\net.exe
                        net.exe stop wuauserv /y
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:796
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 stop wuauserv /y
                          4⤵
                            PID:836
                        • C:\Windows\SysWOW64\net.exe
                          net.exe stop srservice /y
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2384
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop srservice /y
                            4⤵
                            • System Location Discovery: System Language Discovery
                            PID:3044
                        • C:\Windows\SysWOW64\net.exe
                          net.exe stop 360timeprot /y
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • System Time Discovery
                          PID:2764
                          • C:\Windows\SysWOW64\net1.exe
                            C:\Windows\system32\net1 stop 360timeprot /y
                            4⤵
                            • System Time Discovery
                            PID:1192
                        • C:\Windows\SysWOW64\sc.exe
                          C:\Windows\system32\sc.exe config srservice start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:1868
                        • C:\Windows\SysWOW64\sc.exe
                          C:\Windows\system32\sc.exe config SharedAccess start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:600
                        • C:\Windows\SysWOW64\sc.exe
                          C:\Windows\system32\sc.exe config wscsvc start= disabled
                          3⤵
                          • Launches sc.exe
                          • System Location Discovery: System Language Discovery
                          PID:568
                        • C:\Windows\SysWOW64\sc.exe
                          C:\Windows\system32\sc.exe config srservice start= disabled
                          3⤵
                          • Launches sc.exe
                          PID:1796
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:2456
                        • C:\Windows\SysWOW64\reg.exe
                          C:\Windows\system32\reg.exe delete "hklm\SYSTEM\ControlSet001\Control\SafeBoot\Network\{4D36E967-E325-11CE-BFC1-08002BE10318}" /f
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:3064
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                          3⤵
                            PID:1696
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib -s -h -r F:\Autorun.inf\*.* /s /d
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Views/modifies file attributes
                              PID:2572
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd /c rmdir F:\Autorun.inf /s /q
                            3⤵
                              PID:896
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:1580
                              • C:\Windows\SysWOW64\attrib.exe
                                attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Views/modifies file attributes
                                PID:2964
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c rmdir C:\Autorun.inf /s /q
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2736
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:2240
                              • C:\Windows\SysWOW64\attrib.exe
                                attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                4⤵
                                • System Location Discovery: System Language Discovery
                                • Views/modifies file attributes
                                PID:2932
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c rmdir F:\Autorun.inf /s /q
                              3⤵
                              • System Location Discovery: System Language Discovery
                              PID:812
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                              3⤵
                                PID:2908
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  • Views/modifies file attributes
                                  PID:2616
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c rmdir C:\Autorun.inf /s /q
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1804
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2388
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                  4⤵
                                  • Views/modifies file attributes
                                  PID:2220
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c rmdir F:\Autorun.inf /s /q
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:2004
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                3⤵
                                • System Location Discovery: System Language Discovery
                                PID:1140
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                  4⤵
                                  • Views/modifies file attributes
                                  PID:2040
                              • C:\Windows\SysWOW64\cmd.exe
                                cmd /c rmdir C:\Autorun.inf /s /q
                                3⤵
                                  PID:1816
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:2924
                                  • C:\Windows\SysWOW64\attrib.exe
                                    attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                    4⤵
                                    • Views/modifies file attributes
                                    PID:1156
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c rmdir F:\Autorun.inf /s /q
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:1844
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                  3⤵
                                    PID:3044
                                    • C:\Windows\SysWOW64\attrib.exe
                                      attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                      4⤵
                                      • Views/modifies file attributes
                                      PID:2864
                                  • C:\Windows\SysWOW64\cmd.exe
                                    cmd /c rmdir C:\Autorun.inf /s /q
                                    3⤵
                                      PID:1336
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2216
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                        4⤵
                                        • Views/modifies file attributes
                                        PID:2236
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c rmdir F:\Autorun.inf /s /q
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:480
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2176
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                        4⤵
                                        • Views/modifies file attributes
                                        PID:3036
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c rmdir C:\Autorun.inf /s /q
                                      3⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:2300
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                      3⤵
                                        PID:2712
                                        • C:\Windows\SysWOW64\attrib.exe
                                          attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                          4⤵
                                          • Views/modifies file attributes
                                          PID:2844
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c rmdir F:\Autorun.inf /s /q
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2416
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:1972
                                        • C:\Windows\SysWOW64\attrib.exe
                                          attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                          4⤵
                                          • Views/modifies file attributes
                                          PID:3028
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c rmdir C:\Autorun.inf /s /q
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2536
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                        3⤵
                                        • System Location Discovery: System Language Discovery
                                        PID:2900
                                        • C:\Windows\SysWOW64\attrib.exe
                                          attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          • Views/modifies file attributes
                                          PID:2288
                                      • C:\Windows\SysWOW64\cmd.exe
                                        cmd /c rmdir F:\Autorun.inf /s /q
                                        3⤵
                                          PID:2960
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                          3⤵
                                            PID:1208
                                            • C:\Windows\SysWOW64\attrib.exe
                                              attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                              4⤵
                                              • Views/modifies file attributes
                                              PID:344
                                          • C:\Windows\SysWOW64\cmd.exe
                                            cmd /c rmdir C:\Autorun.inf /s /q
                                            3⤵
                                              PID:1772
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd /c attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                              3⤵
                                                PID:1272
                                                • C:\Windows\SysWOW64\attrib.exe
                                                  attrib -s -h -r F:\Autorun.inf\*.* /s /d
                                                  4⤵
                                                  • Views/modifies file attributes
                                                  PID:1160
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c rmdir F:\Autorun.inf /s /q
                                                3⤵
                                                  PID:840
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:3020
                                                  • C:\Windows\SysWOW64\attrib.exe
                                                    attrib -s -h -r C:\Autorun.inf\*.* /s /d
                                                    4⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Views/modifies file attributes
                                                    PID:3052
                                                • C:\Windows\SysWOW64\cmd.exe
                                                  cmd /c rmdir C:\Autorun.inf /s /q
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:1336
                                              • C:\Windows\SysWOW64\net.exe
                                                net.exe stop wscsvc /y
                                                2⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:1048
                                                • C:\Windows\SysWOW64\net1.exe
                                                  C:\Windows\system32\net1 stop wscsvc /y
                                                  3⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:2348
                                              • C:\Windows\SysWOW64\net.exe
                                                net.exe stop sharedaccess /y
                                                2⤵
                                                  PID:2556
                                                  • C:\Windows\SysWOW64\net1.exe
                                                    C:\Windows\system32\net1 stop sharedaccess /y
                                                    3⤵
                                                      PID:1700
                                                  • C:\Windows\SysWOW64\net.exe
                                                    net.exe stop wuauserv /y
                                                    2⤵
                                                      PID:2320
                                                      • C:\Windows\SysWOW64\net1.exe
                                                        C:\Windows\system32\net1 stop wuauserv /y
                                                        3⤵
                                                          PID:1364
                                                      • C:\Windows\SysWOW64\net.exe
                                                        net.exe stop srservice /y
                                                        2⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2812
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 stop srservice /y
                                                          3⤵
                                                          • System Location Discovery: System Language Discovery
                                                          PID:1680
                                                      • C:\Windows\SysWOW64\net.exe
                                                        net.exe stop 360timeprot /y
                                                        2⤵
                                                        • System Time Discovery
                                                        PID:2864
                                                        • C:\Windows\SysWOW64\net1.exe
                                                          C:\Windows\system32\net1 stop 360timeprot /y
                                                          3⤵
                                                          • System Time Discovery
                                                          PID:3032
                                                    • C:\Windows\system32\taskeng.exe
                                                      taskeng.exe {C4CC18A8-9A98-4E3A-B237-19EBB1A66DC3} S-1-5-18:NT AUTHORITY\System:Service:
                                                      1⤵
                                                        PID:1656

                                                      Network

                                                      MITRE ATT&CK Enterprise v15

                                                      Replay Monitor

                                                      Loading Replay Monitor...

                                                      Downloads

                                                      • C:\Windows\SysWOW64\Option.bat

                                                        Filesize

                                                        82B

                                                        MD5

                                                        3f7fbd2eb34892646e93fd5e6e343512

                                                        SHA1

                                                        265ac1061b54f62350fb7a5f57e566454d013a66

                                                        SHA256

                                                        e75e8d9bfc7a2876d908305186c3656e9de2a4af7f6927ccc6d8c812645abbc7

                                                        SHA512

                                                        53d40eb2f05a23464fbf06193868e7cb30cf0df3da53586a75123fb2c37b29cdddda287ce134809d16a559d87fb20aee0e8add22d396fcb7a55f9a753739b140

                                                      • C:\Windows\Sysinf.bat

                                                        Filesize

                                                        460B

                                                        MD5

                                                        7db3d565d6ddbe65a8b0e093910e7dcd

                                                        SHA1

                                                        d4804e6180c6e74ba79d3343f2f2ccb15e502f12

                                                        SHA256

                                                        a2778cb87fd88c7508ffd506a8ff8d58d0ffc02156f846956e5e99c6cb3d2f3f

                                                        SHA512

                                                        0b3d1d0f44feba9dd78903ff77fdeaea834d930990a86641fb2e4ce04da280d33f6bee0ae0b1320e4070cbe20824062e45b52e5cad797c5985d8e31dce1ef82b

                                                      • C:\Windows\regedt32.sys

                                                        Filesize

                                                        2KB

                                                        MD5

                                                        e7d7ec66bd61fac3843c98650b0c68f6

                                                        SHA1

                                                        a15ae06e1be51038863650746368a71024539bac

                                                        SHA256

                                                        6475d5ecc14fea090774be55723d2d52b7ec7670527a7dbd61edf28c77944cb8

                                                        SHA512

                                                        ac9e9893f5a0af03957731445f63279085f164e9a968d706a99d13012e4459314a7ccc32dc48f62379d69e21a0953c13543c9ded38b5ad5fbc346aa442af1ae6

                                                      • C:\Windows\system\KavUpda.exe

                                                        Filesize

                                                        4.9MB

                                                        MD5

                                                        bdb667f12e906f4d6e235124f8bc11f0

                                                        SHA1

                                                        b12cd62e9564236637a2cf0ce02ac192299bc83e

                                                        SHA256

                                                        f6906e2636e05a8f894282cd4c824d53273aab85d82c3a7e9a8e2543882c4d96

                                                        SHA512

                                                        bdaa815b813ecdef785a45987f6b9f44ccb1ef87f1ea143be60c83f7aa0f2aaa33a2ed6cc1e8f8d52111bf4cf6f7e6aa2dc55106b96f4ebfa264502d01f33819

                                                      • F:\Autorun.inf

                                                        Filesize

                                                        237B

                                                        MD5

                                                        94bcd02c5afd5918b4446345e7a5ded9

                                                        SHA1

                                                        79839238e84be225132e1382fae6333dfc4906a1

                                                        SHA256

                                                        5d9f41e4f886926dae2ed8a57807708110d3c6964ab462be21462bff0088d9a1

                                                        SHA512

                                                        149f6bd49fc3b62fa5f41666bfb3a58060514eec1b61c6aa1ac4c75417c840b028e701eb5533460eb00e2fee8543379564bc47d7477264771d81b99a0caab500

                                                      • memory/1532-0-0x0000000000400000-0x0000000000436000-memory.dmp

                                                        Filesize

                                                        216KB

                                                      We care about your privacy.

                                                      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.