Analysis
-
max time kernel
135s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/09/2024, 09:47
Static task
static1
Behavioral task
behavioral1
Sample
cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe
-
Size
65KB
-
MD5
cf430d21a88574f080c16bc881b01d33
-
SHA1
47d6b48eea1d870ceff8bb3e7446aae8fa4999a8
-
SHA256
1dc9bf158a21e540576ebbd71a95335d4f8353f7b7293168c82227e9d11216a0
-
SHA512
a0eab101943c05e10193831cc797c87eb080b260773b099a44c922ed095df5b8387a97bb5b287ca3fdad30ebc9e665e1da4aa852c887448f6d78ee20523ecce7
-
SSDEEP
1536:NhBoWdHaDL1UOUc01anifKUYJFqLa4oqi:NcWdHaDhocDGKU4t4oqi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "0" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" reg.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" reg.exe -
Event Triggered Execution: Image File Execution Options Injection 1 TTPs 28 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe\Debugger = "C:\\WINDOWS\\system32\\kavy.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe\Debugger = "C:\\WINDOWS\\ctfmon.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe\Debugger = "C:\\WINDOWS\\system32\\iexplore.EXE" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe\Debugger = "C:\\WINDOWS\\system3\\iexplore.EXE" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Runonce\kacvc = "c:\\WINDOWS\\system32\\drivers\\kavx.exe" reg.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\jiantou.reg cmd.exe File created C:\WINDOWS\ctfmon.exe cmd.exe File opened for modification C:\WINDOWS\ctfmon.exe cmd.exe File created C:\Windows\jiantou.reg cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 30 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language gpupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 12 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2718105630-359604950-2820636825-1000_Classes\lnkfile regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\piffile regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{871C5380-42A0-1069-A2EA-08002B30309D}\shell\OpenHomePage\Command regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\ddeexec\Application regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application\ = "IExplore" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\command\ = "\"c:\\Program Files\\Internet Explorer\\IEXPLORE\" \"\"" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\http\shell\open\ddeexec\Application regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\HTTP\shell\open\command regedit.exe -
Runs .reg file with regedit 3 IoCs
pid Process 4020 regedit.exe 2768 regedit.exe 1056 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2428 wrote to memory of 5052 2428 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 85 PID 2428 wrote to memory of 5052 2428 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 85 PID 2428 wrote to memory of 5052 2428 cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe 85 PID 5052 wrote to memory of 4448 5052 cmd.exe 88 PID 5052 wrote to memory of 4448 5052 cmd.exe 88 PID 5052 wrote to memory of 4448 5052 cmd.exe 88 PID 5052 wrote to memory of 3952 5052 cmd.exe 89 PID 5052 wrote to memory of 3952 5052 cmd.exe 89 PID 5052 wrote to memory of 3952 5052 cmd.exe 89 PID 5052 wrote to memory of 4156 5052 cmd.exe 90 PID 5052 wrote to memory of 4156 5052 cmd.exe 90 PID 5052 wrote to memory of 4156 5052 cmd.exe 90 PID 5052 wrote to memory of 3476 5052 cmd.exe 91 PID 5052 wrote to memory of 3476 5052 cmd.exe 91 PID 5052 wrote to memory of 3476 5052 cmd.exe 91 PID 5052 wrote to memory of 2288 5052 cmd.exe 92 PID 5052 wrote to memory of 2288 5052 cmd.exe 92 PID 5052 wrote to memory of 2288 5052 cmd.exe 92 PID 5052 wrote to memory of 4844 5052 cmd.exe 93 PID 5052 wrote to memory of 4844 5052 cmd.exe 93 PID 5052 wrote to memory of 4844 5052 cmd.exe 93 PID 5052 wrote to memory of 2696 5052 cmd.exe 94 PID 5052 wrote to memory of 2696 5052 cmd.exe 94 PID 5052 wrote to memory of 2696 5052 cmd.exe 94 PID 5052 wrote to memory of 1056 5052 cmd.exe 96 PID 5052 wrote to memory of 1056 5052 cmd.exe 96 PID 5052 wrote to memory of 1056 5052 cmd.exe 96 PID 5052 wrote to memory of 4784 5052 cmd.exe 97 PID 5052 wrote to memory of 4784 5052 cmd.exe 97 PID 5052 wrote to memory of 4784 5052 cmd.exe 97 PID 5052 wrote to memory of 4020 5052 cmd.exe 98 PID 5052 wrote to memory of 4020 5052 cmd.exe 98 PID 5052 wrote to memory of 4020 5052 cmd.exe 98 PID 5052 wrote to memory of 2768 5052 cmd.exe 99 PID 5052 wrote to memory of 2768 5052 cmd.exe 99 PID 5052 wrote to memory of 2768 5052 cmd.exe 99 PID 5052 wrote to memory of 3752 5052 cmd.exe 100 PID 5052 wrote to memory of 3752 5052 cmd.exe 100 PID 5052 wrote to memory of 3752 5052 cmd.exe 100 PID 5052 wrote to memory of 864 5052 cmd.exe 102 PID 5052 wrote to memory of 864 5052 cmd.exe 102 PID 5052 wrote to memory of 864 5052 cmd.exe 102 PID 5052 wrote to memory of 3692 5052 cmd.exe 110 PID 5052 wrote to memory of 3692 5052 cmd.exe 110 PID 5052 wrote to memory of 3692 5052 cmd.exe 110 PID 5052 wrote to memory of 2128 5052 cmd.exe 111 PID 5052 wrote to memory of 2128 5052 cmd.exe 111 PID 5052 wrote to memory of 2128 5052 cmd.exe 111 PID 5052 wrote to memory of 3892 5052 cmd.exe 112 PID 5052 wrote to memory of 3892 5052 cmd.exe 112 PID 5052 wrote to memory of 3892 5052 cmd.exe 112 PID 5052 wrote to memory of 876 5052 cmd.exe 113 PID 5052 wrote to memory of 876 5052 cmd.exe 113 PID 5052 wrote to memory of 876 5052 cmd.exe 113 PID 5052 wrote to memory of 4544 5052 cmd.exe 114 PID 5052 wrote to memory of 4544 5052 cmd.exe 114 PID 5052 wrote to memory of 4544 5052 cmd.exe 114 PID 5052 wrote to memory of 1492 5052 cmd.exe 115 PID 5052 wrote to memory of 1492 5052 cmd.exe 115 PID 5052 wrote to memory of 1492 5052 cmd.exe 115 PID 5052 wrote to memory of 1004 5052 cmd.exe 116 PID 5052 wrote to memory of 1004 5052 cmd.exe 116 PID 5052 wrote to memory of 1004 5052 cmd.exe 116 PID 5052 wrote to memory of 2268 5052 cmd.exe 117 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2636 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\cmd.execmd.exe /c C:\Users\Admin\AppData\Local\Temp\bt41163.bat "C:\Users\Admin\AppData\Local\Temp\cf430d21a88574f080c16bc881b01d33_JaffaCakes118.exe"2⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5052 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\System" /v DisableRegistryTools /t reg_dword /d 00000000 /f3⤵
- Disables RegEdit via registry modification
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000000 /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
PID:3952
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v Hidden /t reg_dword /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:4156
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v ShowSuperHidden /t reg_dword /d 00000000 /f3⤵
- Modifies visiblity of hidden/system files in Explorer
- System Location Discovery: System Language Discovery
PID:3476
-
-
C:\Windows\SysWOW64\reg.exereg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v HideFileExt /t reg_dword /d 00000001 /f3⤵
- Modifies visibility of file extensions in Explorer
- System Location Discovery: System Language Discovery
PID:2288
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\Folder\Hidden\SHOWALL" /v CheckedValue /t reg_dword /d 00000000 /f3⤵
- System Location Discovery: System Language Discovery
PID:4844
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v {871C5380-42A0-1069-A2EA-08002B30309D} /t reg_dword /d 00000001 /f3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s C:\Windows\jiantou.reg3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:1056
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v NoInternetIcon /t reg_dword /d 00000001 /f3⤵
- System Location Discovery: System Language Discovery
PID:4784
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:4020
-
-
C:\Windows\SysWOW64\regedit.exeREGEDIT /S "C:\Users\Admin\AppData\Local\Temp.\DefOpen.reg"3⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:2768
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Runonce" /v kacvc /t reg_sz /d c:\WINDOWS\system32\drivers\kavx.exe /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3752
-
-
C:\Windows\SysWOW64\gpupdate.exegpupdate.exe /force3⤵
- System Location Discovery: System Language Discovery
PID:864
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\theworld.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3692
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\firefox.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2128
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\opera.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3892
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Maxthon.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:876
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\chrome.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:4544
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\TTraveler.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\hsreg.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\Iparmor.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2268
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360tray.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:3908
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\srgui.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:4072
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\sriecli.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2788
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\360safe.exe" /v Debugger /t reg_sz /d C:\WINDOWS\ctfmon.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:4324
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\RSTray.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system32\kavy.exe /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:2836
-
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Image File Execution Options\GreenBrowser.exe" /v Debugger /t reg_sz /d C:\WINDOWS\system3\iexplore.EXE /f3⤵
- Event Triggered Execution: Image File Execution Options Injection
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\attrib.exeATTRIB -H -R -S -A c:\GRLDR3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2636
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Image File Execution Options Injection
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
217B
MD5eb05fdeaddc8bac55faebc8da0561c6b
SHA1e5e371be9894c9593774f4319e7f1d0274eb0f03
SHA25687c5552b74991369e61ab4228c1b15a2047c6de79bd60c483293bb9200fdd91b
SHA51295d616a03d1000f6abf139f6791bf3f257bee861c49419e6cfd90b579b56c2162b8f863265c219f147cb833e7d6d9b392214c9b6ecec0cdf63df3f79b3a7dd99
-
Filesize
229B
MD50a99bb0fbc273298d23aefea136a870d
SHA1089c95ef3a22b4afc6e1828a69558b34425b2918
SHA256b344aa402eb89946e109900bea40871b4ee23f12b28ac640c184cd9a7bf897fb
SHA51204ce4f6ab65590061ffd5fdb4b236cbec9e2aba95f513bacfcd0d0170994db9def4fba6271ecc85e90e8babee5e69caf57c1b2657ca5b3bec6038cf91948d0fd
-
Filesize
5KB
MD5a1f75c8ae94e9d3ef059481bee42a087
SHA12b3f212f6449adfe6289f15ecd030bc194e11a59
SHA2563de561aa2b926f3a486df3e26b56b8da4f843bc06ecfdaca286b839213a13dc9
SHA512f0e714951d81594e675b57266cab706469fdbfff50b8c0989bb84f061287374bcc1027681acf0055af058ae44ca4c177104f516b501fa021a52f85f9542ff94d
-
Filesize
129B
MD5a2d95ae638ce4b14357c46de3e575cfa
SHA13f8ee00f17676d5899ee25895477cd566b544abd
SHA256180885b4a0ddf6a090daacb6dd0078c06e9ef6903b6594df769aa35b3e547041
SHA5121d8cbcf527f7b16d79a9eab20db0238e473bcb900f9dda4fffa73ffdc908da32591d453203c572c91c9af38ed371c07364486e299e46a5b058283385de3c0564