Analysis
-
max time kernel
122s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
-
Size
65KB
-
MD5
cf430d21a88574f080c16bc881b01d33
-
SHA1
47d6b48eea1d870ceff8bb3e7446aae8fa4999a8
-
SHA256
1dc9bf158a21e540576ebbd71a95335d4f8353f7b7293168c82227e9d11216a0
-
SHA512
a0eab101943c05e10193831cc797c87eb080b260773b099a44c922ed095df5b8387a97bb5b287ca3fdad30ebc9e665e1da4aa852c887448f6d78ee20523ecce7
-
SSDEEP
1536:NhBoWdHaDL1UOUc01anifKUYJFqLa4oqi:NcWdHaDhocDGKU4t4oqi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" reg.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe\Debugger = "C:\\WINDOWS\\system32\\kavy.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe\Debugger = "C:\\WINDOWS\\system3\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\kacvc = "c:\\WINDOWS\\system32\\drivers\\kavx.exe" reg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\WINDOWS\ctfmon.exe cmd.exe File opened for modification C:\WINDOWS\ctfmon.exe cmd.exe File created C:\Windows\jiantou.reg cmd.exe File opened for modification C:\Windows\jiantou.reg cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 11 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\command\ = "\"c:\\Program Files\\Internet Explorer\\IEXPLORE\" \"\"" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\lnkfile regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\ddeexec\Application regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\ddeexec regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\ddeexec\Application\ = "IExplore" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP regedit.exe -
Runs .reg file with regedit 3 IoCs
pid Process 924 regedit.exe 2448 regedit.exe 2704 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2524 2480 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2524 2480 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2524 2480 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 31 PID 2480 wrote to memory of 2524 2480 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 31 PID 2524 wrote to memory of 2084 2524 cmd.exe 33 PID 2524 wrote to memory of 2084 2524 cmd.exe 33 PID 2524 wrote to memory of 2084 2524 cmd.exe 33 PID 2524 wrote to memory of 2084 2524 cmd.exe 33 PID 2524 wrote to memory of 1148 2524 cmd.exe 34 PID 2524 wrote to memory of 1148 2524 cmd.exe 34 PID 2524 wrote to memory of 1148 2524 cmd.exe 34 PID 2524 wrote to memory of 1148 2524 cmd.exe 34 PID 2524 wrote to memory of 1368 2524 cmd.exe 35 PID 2524 wrote to memory of 1368 2524 cmd.exe 35 PID 2524 wrote to memory of 1368 2524 cmd.exe 35 PID 2524 wrote to memory of 1368 2524 cmd.exe 35 PID 2524 wrote to memory of 2316 2524 cmd.exe 36 PID 2524 wrote to memory of 2316 2524 cmd.exe 36 PID 2524 wrote to memory of 2316 2524 cmd.exe 36 PID 2524 wrote to memory of 2316 2524 cmd.exe 36 PID 2524 wrote to memory of 2336 2524 cmd.exe 37 PID 2524 wrote to memory of 2336 2524 cmd.exe 37 PID 2524 wrote to memory of 2336 2524 cmd.exe 37 PID 2524 wrote to memory of 2336 2524 cmd.exe 37 PID 2524 wrote to memory of 2332 2524 cmd.exe 38 PID 2524 wrote to memory of 2332 2524 cmd.exe 38 PID 2524 wrote to memory of 2332 2524 cmd.exe 38 PID 2524 wrote to memory of 2332 2524 cmd.exe 38 PID 2524 wrote to memory of 2040 2524 cmd.exe 39 PID 2524 wrote to memory of 2040 2524 cmd.exe 39 PID 2524 wrote to memory of 2040 2524 cmd.exe 39 PID 2524 wrote to memory of 2040 2524 cmd.exe 39 PID 2524 wrote to memory of 924 2524 cmd.exe 40 PID 2524 wrote to memory of 924 2524 cmd.exe 40 PID 2524 wrote to memory of 924 2524 cmd.exe 40 PID 2524 wrote to memory of 924 2524 cmd.exe 40 PID 2524 wrote to memory of 2320 2524 cmd.exe 41 PID 2524 wrote to memory of 2320 2524 cmd.exe 41 PID 2524 wrote to memory of 2320 2524 cmd.exe 41 PID 2524 wrote to memory of 2320 2524 cmd.exe 41 PID 2524 wrote to memory of 2448 2524 cmd.exe 42 PID 2524 wrote to memory of 2448 2524 cmd.exe 42 PID 2524 wrote to memory of 2448 2524 cmd.exe 42 PID 2524 wrote to memory of 2448 2524 cmd.exe 42 PID 2524 wrote to memory of 2704 2524 cmd.exe 43 PID 2524 wrote to memory of 2704 2524 cmd.exe 43 PID 2524 wrote to memory of 2704 2524 cmd.exe 43 PID 2524 wrote to memory of 2704 2524 cmd.exe 43 PID 2524 wrote to memory of 2700 2524 cmd.exe 44 PID 2524 wrote to memory of 2700 2524 cmd.exe 44 PID 2524 wrote to memory of 2700 2524 cmd.exe 44 PID 2524 wrote to memory of 2700 2524 cmd.exe 44 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2812 2524 cmd.exe 45 PID 2524 wrote to memory of 2548 2524 cmd.exe 46 PID 2524 wrote to memory of 2548 2524 cmd.exe 46 PID 2524 wrote to memory of 2548 2524 cmd.exe 46 PID 2524 wrote to memory of 2548 2524 cmd.exe 46 PID 2524 wrote to memory of 2544 2524 cmd.exe 47 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2080 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt15318.bat "C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t reg_dword /d 00000000 /f3⤵
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
PID:2084
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000000 /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
PID:1148
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t reg_dword /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:1368
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t reg_dword /d 00000000 /f3⤵
- Modifies visiblity of hidden/system files in Explorer
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000001 /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
PID:2336
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v {871C5380-42A0-1069-A2EA-08002B30309D} /t reg_dword /d 00000001 /f3⤵
- System Location Discovery: System Language Discovery
PID:2040
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Windows\jiantou.reg3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:924
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoInternetIcon /t reg_dword /d 00000001 /f3⤵
- System Location Discovery: System Language Discovery
PID:2320
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:2448
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:2704
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runonce" /v kacvc /t reg_sz /d c:\WINDOWS\system32\drivers\kavx.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate.exe /force3⤵
- System Location Discovery: System Language Discovery
PID:2812
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2548
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2544
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2564
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2580
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2600
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2624
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2672
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:652
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2004
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2424
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3068
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\kavy.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2248
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system3\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1520
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB -H -R -S -A c:\GRLDR3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD5eb05fdeaddc8bac55faebc8da0561c6b
SHA1e5e371be9894c9593774f4319e7f1d0274eb0f03
SHA25687c5552b74991369e61ab4228c1b15a2047c6de79bd60c483293bb9200fdd91b
SHA51295d616a03d1000f6abf139f6791bf3f257bee861c49419e6cfd90b579b56c2162b8f863265c219f147cb833e7d6d9b392214c9b6ecec0cdf63df3f79b3a7dd99
-
Filesize
229B
MD50a99bb0fbc273298d23aefea136a870d
SHA1089c95ef3a22b4afc6e1828a69558b34425b2918
SHA256b344aa402eb89946e109900bea40871b4ee23f12b28ac640c184cd9a7bf897fb
SHA51204ce4f6ab65590061ffd5fdb4b236cbec9e2aba95f513bacfcd0d0170994db9def4fba6271ecc85e90e8babee5e69caf57c1b2657ca5b3bec6038cf91948d0fd
-
Filesize
5KB
MD5a1f75c8ae94e9d3ef059481bee42a087
SHA12b3f212f6449adfe6289f15ecd030bc194e11a59
SHA2563de561aa2b926f3a486df3e26b56b8da4f843bc06ecfdaca286b839213a13dc9
SHA512f0e714951d81594e675b57266cab706469fdbfff50b8c0989bb84f061287374bcc1027681acf0055af058ae44ca4c177104f516b501fa021a52f85f9542ff94d
-
Filesize
129B
MD5a2d95ae638ce4b14357c46de3e575cfa
SHA13f8ee00f17676d5899ee25895477cd566b544abd
SHA256180885b4a0ddf6a090daacb6dd0078c06e9ef6903b6594df769aa35b3e547041
SHA5121d8cbcf527f7b16d79a9eab20db0238e473bcb900f9dda4fffa73ffdc908da32591d453203c572c91c9af38ed371c07364486e299e46a5b058283385de3c0564