Analysis
-
max time kernel
123s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 15:19
Static task
static1
Behavioral task
behavioral1
Sample
c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe
-
Size
207KB
-
MD5
c344cb3365d1c252ec9bca116df262c2
-
SHA1
feb6d0bbacdb99b882d563f27b78c9723f2aac49
-
SHA256
5058c2ecac89eb616b4478e9a1f61522ef906adc2fd18206ee6ab445be3b3ff3
-
SHA512
ce5b7ab0ded562ca52f6f5a281f0d46b88f76fd39385b52db7bc14e244434143215da8cdf0323f6de4a34b024f7bffc4734353da89fef5193f9ab454ede749be
-
SSDEEP
3072:1LFrb30BRtBZZg+i2ayy2RjLTuVyu7CJDgoMT3Q092+ZCInhNLFrb30BRtBZZg+f:ZJ0BXScFy2RsQJ8zgkZCihJ0BXScv
Malware Config
Extracted
C:\Program Files (x86)\3368c-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/865D52C0262909CA
http://decryptor.cc/865D52C0262909CA
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Drops startup file 2 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File created \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\startup\3368c-readme.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\k51299BQXH = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe" c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Drops desktop.ini file(s) 64 IoCs
description ioc Process File opened for modification \??\c:\users\admin\appdata\local\microsoft\feeds cache\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\libraries\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\saved games\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\desktop\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\videos\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\feeds cache\ajw4qsk9\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\xli5q0eh\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\documents\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\music\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\pictures\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\history\history.ie5\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\recorded tv\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\ringtones\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\maintenance\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\libraries\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\sendto\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\music\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\accessibility\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\desktop\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\links\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\searches\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\windows powershell\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\feeds cache\g4ua8t7d\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\fh198yo1\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\administrative tools\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories\accessibility\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\favorites\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\pictures\sample pictures\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\temporary internet files\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\internet explorer\quick launch\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\maintenance\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\downloads\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\favorites\links for united states\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\games\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows mail\stationery\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\burn\burn\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\jvmdvgrw\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\music\sample music\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\downloads\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\recent\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\temporary internet files\content.ie5\ojbrre9r\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\administrative tools\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\windows\history\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\accessories\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\startup\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\local\microsoft\feeds cache\e9p9lro9\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\accessories\system tools\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\videos\sample videos\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\programdata\microsoft\windows\start menu\programs\accessories\tablet pc\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\default\appdata\roaming\microsoft\windows\start menu\programs\accessories\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\appdata\roaming\microsoft\windows\start menu\programs\accessories\accessibility\Desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\pictures\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\favorites\links\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\recorded tv\sample media\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\admin\videos\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\users\public\documents\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\T: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\B: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\O: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\R: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\D: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\I: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\K: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\N: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\E: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\P: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\S: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\A: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\G: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\J: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\U: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\F: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\M: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\Q: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\W: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\H: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\V: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\X: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\Y: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened (read-only) \??\Z: c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\CatRoot2\dberr.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3450744190-3404161390-554719085-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\c71hl.bmp" c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Drops file in Program Files directory 24 IoCs
description ioc Process File opened for modification \??\c:\program files\JoinHide.ex_ c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceqp35.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\SkipInvoke.mpv2 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlcecompact35.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File created \??\c:\program files (x86)\3368c-readme.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\InitializeBlock.001 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\InstallRegister.DVR-MS c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\MountOut.mpeg c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\ResetRemove.ex_ c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\ProtectReset.pps c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\ReceiveMerge.wmf c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\desktop.ini c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\3368c-readme.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceer35EN.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceme35.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceoledb35.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlcese35.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File created \??\c:\program files\3368c-readme.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\RepairUnprotect.shtml c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files\StopConvertFrom.ico c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\3368c-readme.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File created \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\desktop\3368c-readme.txt c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe File opened for modification \??\c:\program files (x86)\microsoft sql server compact edition\v3.5\sqlceca35.dll c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2676 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe 2152 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 2676 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe Token: SeDebugPrivilege 2152 powershell.exe Token: SeBackupPrivilege 2812 vssvc.exe Token: SeRestorePrivilege 2812 vssvc.exe Token: SeAuditPrivilege 2812 vssvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2676 wrote to memory of 2152 2676 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe 28 PID 2676 wrote to memory of 2152 2676 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe 28 PID 2676 wrote to memory of 2152 2676 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe 28 PID 2676 wrote to memory of 2152 2676 c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe 28 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c344cb3365d1c252ec9bca116df262c2_JaffaCakes118.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2592
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
3Subvert Trust Controls
1Install Root Certificate
1Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD54ce54cb84ed15ced5d23d28b7f51e3e2
SHA1b7fae0d2cdb1d997cf3eb11ef78edc4847657755
SHA2560920b9e058b900f86b6752cfe99b0c4ff457e839bc1ca9ee707e8bd20063c16e
SHA512662720dd92a4214e3308359cbbba945a663b78531fe33319b1ebe3d9398ab9c8bd8affc4754ab2ed7e2bc3ef047ce891ce5b97377ddc059f230ce67d0be056b1
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5505335c3fe7e57c03151935e58467158
SHA163000fd4da90a812682e1cf38191444f9e82ff6e
SHA256e5c3f2c449e443e19251ab5f8ec2e503998a52f7dd303335f54d5b7cffd68390
SHA51284730b45bd15328daee93daa9137d0d1473eb2285b56a5feda13f3462de8612c5d8c4a622c03231e78c14a078af75e05a914a28aaaa015d6ec8d4b752fb12616
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
191KB
MD5c5f71c41daefa1d2b672ee52c837775b
SHA1063de94d4cbf511cd4f8aeac0e5e4fa82dde9740
SHA256df1752551f35a64737f79f792cdf6df48879b10e090ae1639ee5c7f3900ab52b
SHA512252361c2d48618c514d336af7cc76147a95c3d4f2a8cd64582ac5efcec081b9511ca28d970ecbc25c4b97e88682f81411d331723fd01bd361e48903f744cbf57
-
\??\c:\users\admin\appdata\roaming\microsoft\windows\recent\customdestinations\590aee7bdd69b59b.customDestinations-ms
Filesize8KB
MD59ed26aace16827ce4f2aa4e3ffd056e3
SHA116edd09f0bd9b346394c56d21a50836772a7c92f
SHA256d65c2327fd54b6d9511adef9ed3543398703613ded6e58063037e7fc41d5536b
SHA5126f83bbed4618797d04f2a8d808e95012dfb5c6a22eb91ace2adcbdadb9a3607788d66b93d65a9ebaa40269a1195b086118b0281984bf5dce3086d22eede827fc