Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
25/08/2024, 00:29
Behavioral task
behavioral1
Sample
bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe
-
Size
57KB
-
MD5
bfc1c5c40476d91bcebae28ecaf43f36
-
SHA1
eb42cb53ec34896715d3865aa4d38264159a534b
-
SHA256
7fbdf086653e35df4484aaf3cd036e0fccacfb6d73b2da86084967b8759147e2
-
SHA512
55faf54ee9561bc79d8dfac9bbe54e1a5c4c8b87fe629b61f0fad0a42246237f837f0a0fdb942fdab777ab271a9672e921e66688db983c08675de10168bac5ee
-
SSDEEP
1536:w6Jz6+PtawWCVk52lG01bDmHxNZ7hmWYiJfQNiecoN9F/XZ8El0x:YItRkEjANZ74Mjecox/JL0x
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\f773afe.exe\"" bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\f773afe.exe\"" bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Drops startup file 3 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe f773afe.exe -
Executes dropped EXE 2 IoCs
pid Process 2924 f773afe.exe 2580 f773afe.exe -
Loads dropped DLL 4 IoCs
pid Process 2760 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 2760 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 2924 f773afe.exe 2580 f773afe.exe -
resource yara_rule behavioral1/memory/2096-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2760-16-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2760-18-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2760-17-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2760-15-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2760-6-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2760-5-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2096-14-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/files/0x000d00000001225f-20.dat upx behavioral1/memory/2760-21-0x0000000000230000-0x0000000000242000-memory.dmp upx behavioral1/memory/2924-31-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2760-30-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2924-48-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/2580-46-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral1/memory/2580-55-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\OMdi3n9h2uc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\f773afe.exe\"" bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\OMdi3n9h2uc = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\f773afe.exe\"" bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2096 set thread context of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2924 set thread context of 2580 2924 f773afe.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f773afe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2680 ipconfig.exe -
Kills process with taskkill 64 IoCs
pid Process 2884 taskkill.exe 1488 taskkill.exe 2284 taskkill.exe 2160 taskkill.exe 2372 taskkill.exe 2700 taskkill.exe 1988 taskkill.exe 1696 taskkill.exe 2820 taskkill.exe 1660 taskkill.exe 2680 taskkill.exe 2208 taskkill.exe 928 taskkill.exe 2076 taskkill.exe 1880 taskkill.exe 2056 taskkill.exe 1832 taskkill.exe 2600 taskkill.exe 1788 taskkill.exe 1716 taskkill.exe 556 taskkill.exe 2256 taskkill.exe 1968 taskkill.exe 2120 taskkill.exe 1420 taskkill.exe 2892 taskkill.exe 1580 taskkill.exe 2756 taskkill.exe 1908 taskkill.exe 2468 taskkill.exe 948 taskkill.exe 2508 taskkill.exe 1032 taskkill.exe 1836 taskkill.exe 888 taskkill.exe 2112 taskkill.exe 1688 taskkill.exe 2572 taskkill.exe 2520 taskkill.exe 2568 taskkill.exe 2888 taskkill.exe 556 taskkill.exe 2828 taskkill.exe 1864 taskkill.exe 2260 taskkill.exe 2220 taskkill.exe 2904 taskkill.exe 1516 taskkill.exe 2752 taskkill.exe 1912 taskkill.exe 2516 taskkill.exe 2752 taskkill.exe 556 taskkill.exe 1764 taskkill.exe 1092 taskkill.exe 2132 taskkill.exe 2420 taskkill.exe 1004 taskkill.exe 1764 taskkill.exe 1664 taskkill.exe 264 taskkill.exe 316 taskkill.exe 2956 taskkill.exe 2028 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1872 taskkill.exe Token: SeDebugPrivilege 1004 taskkill.exe Token: SeDebugPrivilege 1988 taskkill.exe Token: SeDebugPrivilege 2212 taskkill.exe Token: SeDebugPrivilege 1968 taskkill.exe Token: SeDebugPrivilege 1908 taskkill.exe Token: SeDebugPrivilege 2120 taskkill.exe Token: SeDebugPrivilege 2992 taskkill.exe Token: SeDebugPrivilege 1876 taskkill.exe Token: SeDebugPrivilege 2260 taskkill.exe Token: SeDebugPrivilege 1412 taskkill.exe Token: SeDebugPrivilege 2752 taskkill.exe Token: SeDebugPrivilege 2572 taskkill.exe Token: SeDebugPrivilege 2196 taskkill.exe Token: SeDebugPrivilege 2944 taskkill.exe Token: SeDebugPrivilege 316 taskkill.exe Token: SeDebugPrivilege 1656 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 2396 taskkill.exe Token: SeDebugPrivilege 1856 taskkill.exe Token: SeDebugPrivilege 560 taskkill.exe Token: SeDebugPrivilege 1452 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 268 taskkill.exe Token: SeDebugPrivilege 2972 taskkill.exe Token: SeDebugPrivilege 2372 taskkill.exe Token: SeDebugPrivilege 2520 taskkill.exe Token: SeDebugPrivilege 336 taskkill.exe Token: SeDebugPrivilege 2224 taskkill.exe Token: SeDebugPrivilege 2468 taskkill.exe Token: SeDebugPrivilege 2568 taskkill.exe Token: SeDebugPrivilege 2732 taskkill.exe Token: SeDebugPrivilege 2248 taskkill.exe Token: SeDebugPrivilege 1420 taskkill.exe Token: SeDebugPrivilege 1472 taskkill.exe Token: SeDebugPrivilege 2864 taskkill.exe Token: SeDebugPrivilege 2628 taskkill.exe Token: SeDebugPrivilege 2064 taskkill.exe Token: SeDebugPrivilege 1880 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 1772 taskkill.exe Token: SeDebugPrivilege 888 taskkill.exe Token: SeDebugPrivilege 948 taskkill.exe Token: SeDebugPrivilege 1736 taskkill.exe Token: SeDebugPrivilege 1504 taskkill.exe Token: SeDebugPrivilege 1184 taskkill.exe Token: SeDebugPrivilege 556 taskkill.exe Token: SeDebugPrivilege 2220 taskkill.exe Token: SeDebugPrivilege 2824 taskkill.exe Token: SeDebugPrivilege 2928 taskkill.exe Token: SeDebugPrivilege 2888 taskkill.exe Token: SeDebugPrivilege 2956 taskkill.exe Token: SeDebugPrivilege 1472 taskkill.exe Token: SeDebugPrivilege 1696 taskkill.exe Token: SeDebugPrivilege 1152 taskkill.exe Token: SeDebugPrivilege 2628 taskkill.exe Token: SeDebugPrivilege 1788 taskkill.exe Token: SeDebugPrivilege 1764 taskkill.exe Token: SeDebugPrivilege 1260 taskkill.exe Token: SeDebugPrivilege 1092 taskkill.exe Token: SeDebugPrivilege 860 taskkill.exe Token: SeDebugPrivilege 1716 taskkill.exe Token: SeDebugPrivilege 1056 taskkill.exe Token: SeDebugPrivilege 1072 taskkill.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 2924 f773afe.exe 2580 f773afe.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2096 wrote to memory of 2760 2096 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 30 PID 2760 wrote to memory of 2924 2760 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2924 2760 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2924 2760 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 31 PID 2760 wrote to memory of 2924 2760 bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2924 wrote to memory of 2580 2924 f773afe.exe 32 PID 2580 wrote to memory of 2680 2580 f773afe.exe 33 PID 2580 wrote to memory of 2680 2580 f773afe.exe 33 PID 2580 wrote to memory of 2680 2580 f773afe.exe 33 PID 2580 wrote to memory of 2680 2580 f773afe.exe 33 PID 2580 wrote to memory of 1872 2580 f773afe.exe 34 PID 2580 wrote to memory of 1872 2580 f773afe.exe 34 PID 2580 wrote to memory of 1872 2580 f773afe.exe 34 PID 2580 wrote to memory of 1872 2580 f773afe.exe 34 PID 2580 wrote to memory of 1004 2580 f773afe.exe 38 PID 2580 wrote to memory of 1004 2580 f773afe.exe 38 PID 2580 wrote to memory of 1004 2580 f773afe.exe 38 PID 2580 wrote to memory of 1004 2580 f773afe.exe 38 PID 2580 wrote to memory of 1988 2580 f773afe.exe 40 PID 2580 wrote to memory of 1988 2580 f773afe.exe 40 PID 2580 wrote to memory of 1988 2580 f773afe.exe 40 PID 2580 wrote to memory of 1988 2580 f773afe.exe 40 PID 2580 wrote to memory of 2212 2580 f773afe.exe 43 PID 2580 wrote to memory of 2212 2580 f773afe.exe 43 PID 2580 wrote to memory of 2212 2580 f773afe.exe 43 PID 2580 wrote to memory of 2212 2580 f773afe.exe 43 PID 2580 wrote to memory of 1968 2580 f773afe.exe 45 PID 2580 wrote to memory of 1968 2580 f773afe.exe 45 PID 2580 wrote to memory of 1968 2580 f773afe.exe 45 PID 2580 wrote to memory of 1968 2580 f773afe.exe 45 PID 2580 wrote to memory of 1908 2580 f773afe.exe 47 PID 2580 wrote to memory of 1908 2580 f773afe.exe 47 PID 2580 wrote to memory of 1908 2580 f773afe.exe 47 PID 2580 wrote to memory of 1908 2580 f773afe.exe 47 PID 2580 wrote to memory of 2120 2580 f773afe.exe 49 PID 2580 wrote to memory of 2120 2580 f773afe.exe 49 PID 2580 wrote to memory of 2120 2580 f773afe.exe 49 PID 2580 wrote to memory of 2120 2580 f773afe.exe 49 PID 2580 wrote to memory of 2992 2580 f773afe.exe 51 PID 2580 wrote to memory of 2992 2580 f773afe.exe 51 PID 2580 wrote to memory of 2992 2580 f773afe.exe 51 PID 2580 wrote to memory of 2992 2580 f773afe.exe 51 PID 2580 wrote to memory of 1876 2580 f773afe.exe 53 PID 2580 wrote to memory of 1876 2580 f773afe.exe 53 PID 2580 wrote to memory of 1876 2580 f773afe.exe 53 PID 2580 wrote to memory of 1876 2580 f773afe.exe 53 PID 2580 wrote to memory of 2260 2580 f773afe.exe 55 PID 2580 wrote to memory of 2260 2580 f773afe.exe 55 PID 2580 wrote to memory of 2260 2580 f773afe.exe 55 PID 2580 wrote to memory of 2260 2580 f773afe.exe 55
Processes
-
C:\Users\Admin\AppData\Local\Temp\bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\bfc1c5c40476d91bcebae28ecaf43f36_JaffaCakes118.exe"2⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe"3⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\f773afe.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /flushdns && ipconfig /renew5⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1872
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1988
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2212
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1968
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2120
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1876
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2572
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:316
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1656
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2396
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1856
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:268
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2972
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2372
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2468
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2568
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2248
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2064
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:948
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1736
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1504
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1152
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:2628
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1788
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Suspicious use of AdjustPrivilegeToken
PID:1056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1072
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2220
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2780
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2112
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2904
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1844
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2132
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2420
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1464
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2752
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2820
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2508
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2952
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1560
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2884
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2180
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1444
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1512
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:928
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:888
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1032
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2528
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1912
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1660
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:556
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2716
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2648
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1696
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1488
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2284
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1836
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1664
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1728
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2056
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1184
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:336
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1544
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1580
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2280
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1400
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:264
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2008
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:1688
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1612
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2384
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2108
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2516
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1832
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:3016
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2208
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2160
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2076
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2256
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2044
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2600
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:2756
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
PID:1864
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:2172
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵
- Kills process with taskkill
PID:2700
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im explorer.exe5⤵PID:1420
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
867B
MD5c5dfb849ca051355ee2dba1ac33eb028
SHA1d69b561148f01c77c54578c10926df5b856976ad
SHA256cbb522d7b7f127ad6a0113865bdf1cd4102e7d0759af635a7cf4720dc963c53b
SHA51288289cdd2c2dd1f5f4c13ab2cf9bc601fc634b5945309bedf9fc5b96bf21697b4cd6da2f383497825e02272816befbac4f44955282ffbbd4dd0ddc52281082da
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1
Filesize242B
MD58be71bf62eeb01b623c0fe9ebd095dd6
SHA149bc2580be0a70be06b4d23d11bedd4ed60fe372
SHA256ca04af5aa1e27db09f393b55aaac6141c32b05f0c48ccdcd136372546ecbcb60
SHA512ddabaa7f95feb36c0918c18af924e7b595c045ea662240f4893dec15232d3b53bbdc14161cfbd67efd021944ee95377ca618238ab83e98d023a3d17ee403cad5
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
57KB
MD5bfc1c5c40476d91bcebae28ecaf43f36
SHA1eb42cb53ec34896715d3865aa4d38264159a534b
SHA2567fbdf086653e35df4484aaf3cd036e0fccacfb6d73b2da86084967b8759147e2
SHA51255faf54ee9561bc79d8dfac9bbe54e1a5c4c8b87fe629b61f0fad0a42246237f837f0a0fdb942fdab777ab271a9672e921e66688db983c08675de10168bac5ee
-
Filesize
3KB
MD5e9032dac10fb27acfa89c3357fad86b3
SHA11623843e0d369c9911989c0730a6470c22dd60fd
SHA2569de0bb4cb8a79f575da4dbc86cedb6a9ef8d94c0b176fd4690b9b7ffee078391
SHA51270e663ad1e87832673f7140aca20dcd3db46c256b91f2924e7a9e1ab24a295d432b625fdcc53b1f3bbc84f91390190e4bd483da5285f95ed0316be09b2b82004