Analysis
-
max time kernel
150s -
max time network
90s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
11-09-2024 05:12
Static task
static1
Behavioral task
behavioral1
Sample
d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe
-
Size
1.9MB
-
MD5
d9ace96249c677b8aa4cc881da8719bf
-
SHA1
043ffe72edfdbbad5c903cc0828e359ee90752b4
-
SHA256
d0272db66c37dcefb057951240329f371dad2bffd53bb999ce4ba915052438ce
-
SHA512
54fca18a7beeaf1c38c833ee4511186dcf3b01f481496b60c165fe1bfab8da077bfdd22425af88833c7dcb6e879831eb69baa686d49b72fb1bee159b40017f0c
-
SSDEEP
49152:UdOjNXMu8VaWg/IbwsYRxUGXET3pbjX6JyytOdsi3:aOjtMaWZUxUfT35X06si
Malware Config
Signatures
-
Modifies security service 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "3" dwme.exe -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 1 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Active Setup\Installed Components explorer.exe -
Disables taskbar notifications via registry modification
-
Drops file in Drivers directory 1 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts Cloud AV 2012v121.exe -
Executes dropped EXE 7 IoCs
pid Process 1216 dwme.exe 604 dwme.exe 2240 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2276 dwme.exe 2180 dwme.exe 924 7C22.tmp -
Loads dropped DLL 14 IoCs
pid Process 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral1/memory/2380-2-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/2380-29-0x0000000000400000-0x0000000000914000-memory.dmp upx behavioral1/memory/2380-28-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/2240-40-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/604-43-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1216-121-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2276-123-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2648-126-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/1216-190-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2180-194-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2648-197-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/2648-282-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/1216-304-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2648-309-0x0000000000400000-0x0000000000917000-memory.dmp upx behavioral1/memory/1216-374-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Unsecured Credentials: Credentials In Files 1 TTPs
Steal credentials from unsecured files.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\B66.exe = "C:\\Program Files (x86)\\LP\\85F1\\B66.exe" dwme.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\A5sQJ7dEKgZh8234A = "C:\\Windows\\system32\\Cloud AV 2012v121.exe" d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\TcA1uvD2oFpGsJd = "C:\\Users\\Admin\\AppData\\Roaming\\dwme.exe" d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\lxP0ycS1i8234A = "C:\\Users\\Admin\\AppData\\Roaming\\SS1ibD3on4m6W7E\\Cloud AV 2012v121.exe" Cloud AV 2012v121.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\Cloud AV 2012v121.exe Cloud AV 2012v121.exe File created C:\Windows\SysWOW64\Cloud AV 2012v121.exe d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files (x86)\LP\85F1\B66.exe dwme.exe File opened for modification C:\Program Files (x86)\LP\85F1\B66.exe dwme.exe File opened for modification C:\Program Files (x86)\LP\85F1\7C22.tmp dwme.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cloud AV 2012v121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Cloud AV 2012v121.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7C22.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dwme.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\LastAdvertisement = "133705070027162000" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\IconStreams = 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 explorer.exe Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_Classes\Local Settings explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\UserStartTime = "133667487516576000" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify\PastIconsStream = 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 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 1216 dwme.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
description pid Process Token: SeRestorePrivilege 2812 msiexec.exe Token: SeTakeOwnershipPrivilege 2812 msiexec.exe Token: SeSecurityPrivilege 2812 msiexec.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: 33 3008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3008 AUDIODG.EXE Token: 33 3008 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 3008 AUDIODG.EXE Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe Token: SeShutdownPrivilege 1288 explorer.exe -
Suspicious use of FindShellTrayWindow 33 IoCs
pid Process 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 2648 Cloud AV 2012v121.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe -
Suspicious use of SendNotifyMessage 24 IoCs
pid Process 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 2648 Cloud AV 2012v121.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe 1288 explorer.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 2240 Cloud AV 2012v121.exe 2240 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe 2648 Cloud AV 2012v121.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2380 wrote to memory of 1216 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 29 PID 2380 wrote to memory of 1216 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 29 PID 2380 wrote to memory of 1216 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 29 PID 2380 wrote to memory of 1216 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 29 PID 2380 wrote to memory of 604 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 30 PID 2380 wrote to memory of 604 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 30 PID 2380 wrote to memory of 604 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 30 PID 2380 wrote to memory of 604 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 30 PID 2380 wrote to memory of 2240 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2240 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2240 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 31 PID 2380 wrote to memory of 2240 2380 d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe 31 PID 2240 wrote to memory of 2648 2240 Cloud AV 2012v121.exe 32 PID 2240 wrote to memory of 2648 2240 Cloud AV 2012v121.exe 32 PID 2240 wrote to memory of 2648 2240 Cloud AV 2012v121.exe 32 PID 2240 wrote to memory of 2648 2240 Cloud AV 2012v121.exe 32 PID 1216 wrote to memory of 2276 1216 dwme.exe 35 PID 1216 wrote to memory of 2276 1216 dwme.exe 35 PID 1216 wrote to memory of 2276 1216 dwme.exe 35 PID 1216 wrote to memory of 2276 1216 dwme.exe 35 PID 1216 wrote to memory of 2180 1216 dwme.exe 36 PID 1216 wrote to memory of 2180 1216 dwme.exe 36 PID 1216 wrote to memory of 2180 1216 dwme.exe 36 PID 1216 wrote to memory of 2180 1216 dwme.exe 36 PID 1216 wrote to memory of 924 1216 dwme.exe 40 PID 1216 wrote to memory of 924 1216 dwme.exe 40 PID 1216 wrote to memory of 924 1216 dwme.exe 40 PID 1216 wrote to memory of 924 1216 dwme.exe 40 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer dwme.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\HideSCAHealth = "1" dwme.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\dwme.exe"C:\Users\Admin\AppData\Local\Temp\dwme.exe"2⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
- System policy modification
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\dwme.exeC:\Users\Admin\AppData\Local\Temp\dwme.exe startC:\Users\Admin\AppData\Roaming\177F6\75A85.exe%C:\Users\Admin\AppData\Roaming\177F63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\dwme.exeC:\Users\Admin\AppData\Local\Temp\dwme.exe startC:\Program Files (x86)\F64FB\lvvm.exe%C:\Program Files (x86)\F64FB3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2180
-
-
C:\Program Files (x86)\LP\85F1\7C22.tmp"C:\Program Files (x86)\LP\85F1\7C22.tmp"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:924
-
-
-
C:\Users\Admin\AppData\Roaming\dwme.exeC:\Users\Admin\AppData\Roaming\dwme.exe auto2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:604
-
-
C:\Windows\SysWOW64\Cloud AV 2012v121.exeC:\Windows\system32\Cloud AV 2012v121.exe 5985C:\Users\Admin\AppData\Local\Temp\d9ace96249c677b8aa4cc881da8719bf_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\SS1ibD3on4m6W7E\Cloud AV 2012v121.exeC:\Users\Admin\AppData\Roaming\SS1ibD3on4m6W7E\Cloud AV 2012v121.exe 5985C:\Windows\SysWOW64\Cloud AV 2012v121.exe3⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2648
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
C:\Windows\explorer.exeexplorer.exe1⤵
- Boot or Logon Autostart Execution: Active Setup
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:1288
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5601⤵
- Suspicious use of AdjustPrivilegeToken
PID:3008
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
3Credentials In Files
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300B
MD56b4a4103beb52691b4a504103d28cfbb
SHA18601c0068589cc19188d4e35b59bcf1d854b1fec
SHA25695abe2ce37d28429aa98f8b4062399f68bb2d33db80e75c883a1a0bf9259cf2a
SHA512558155cb859ae56fcfc9ffcdf567c091b924c4be6434501d983461fb6db0432d818c36ae159722322885a85b95983b811e0fb31966ba1ca9886ea2fca3a5a5f0
-
Filesize
696B
MD524d69bd384931a0cab0074e02aa9c924
SHA114b2e3f900520e3b5fcbf9f5d2f7dc361b3a72bc
SHA2560a1eab1aa9b88af2c34b5c23a60e7345ab3742d16838e1c6a46ca1b90ffeab44
SHA512e223e54ec8e2a094091a9e9eba42f8232e2d99ef66e580b27698cb4263f5063ae53d9f90309189fbc56eebe37bb784b6c8f7aa0aa0765dbe8ecf6b49bfbc54b0
-
Filesize
1KB
MD5c227a78c17a07f3bc43f6c692ca18aa7
SHA112a1dc602732247b9282e882c6ebd5094e42e9c9
SHA256be15563e0b8dea70c05a3df077f2a00babfd685edc609dee07ad601e8d24905d
SHA51291be504211bfa2696da25d5937e0165968e1d066efa3455eae3d39d93f9ca5fc9143bbb766814cd1f10c0af7e7b69673a877847f41b1033876161cf7fbaeafe9
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Cloud AV 2012\Cloud AV 2012.lnk
Filesize1KB
MD59a712cc8d6460eaf520b55808b5ebea0
SHA1e2501a6889a4d80754b946229eb29213f08eb732
SHA256ebb069af0ab68bfc0531f2d906be4bef677c08aebe2426582090e04f1a9e050b
SHA5126db3ea848bd8947fbc1b33764376396d9f890b01d6184d8ae89ae17d2b2e1d560e2afb00c5b61f0012e400ec531dedf6ff2b38c2d27055a77c60ec5c6c1eb241
-
Filesize
12KB
MD5bb87f71a6e7f979fcb716926d452b6a8
SHA1f41e3389760eaea099720e980e599a160f0413b9
SHA25614c9c49d8ead9ab59a56c328008f59c20b32c3ad22c00e02d34e16ad7086fe84
SHA512e1d14363274e367ea600afc357d012233fc68f0636e8d05b29992e762d31e9a55b4fa38b08613c2ca528d7fb0f547774a3a3dc79aada32c2c7359c3edcdb549d
-
Filesize
1KB
MD54479f7052910ca9b355153033269d137
SHA1b4a1948fac0189da1ab864f2ab99409a8b94ec88
SHA2562f004397ca3873e935ef84e8bb4902c41bbd5aff435ea0a87dde5ccea7714a3d
SHA512cd5daf8175aa58c41b1d57b3a1dcffb453e718e9c2415218a9f623674253185bc32e1100f4b30e1dabd9450c3504bc1d139564cef99861beef759d9f693aced5
-
Filesize
1KB
MD50dd12ba226fcb653ad4a7c19550eb53a
SHA125561f19f9979a2479c51083d69b50925a3264f8
SHA256bb60887aa93a2bde0f26a9e677bd494b6194543c08f0074705d2470751e8adc7
SHA5120c2f1a0bb1cfc7aa6a17078a821f1016a10a264371c27902fd7ffdf2c31b479780c7785af55b2da0a10863db61a1b77ff340180c9343d5894c1004c513a5c9fa
-
Filesize
1KB
MD5f48cfb5db32cdf990f35a5ef9146dbf4
SHA109b4f991e17aba915160f6c153c6d78e2d4aa4d9
SHA25672439cac78aae2122ddea93a12f562ea85c9fb909bef25cae982480a2d51f397
SHA512385c74297ee70bdce1cf2dbcafd95e1d96f1b9ffd0fac713d614f84b9d02c28359276434ea164082ae46b312f40dd9911a27526df2ef3613118a0efc9271d301
-
Filesize
1KB
MD5da92c10d26caf9083835ea4e9c9d39d9
SHA15248b4965b5b3aeca5dd12f59dcae26d0186b052
SHA256ccf1bd93891bb2e22540ef9baf3acc2e7a30c46054cb12b08567a43ac3fdc8ae
SHA51228e848434bba3facc9a92a9d6fdfc1257261d01a818ef389db3b37c0103451d51c62efa6ac41453f42de22e685d7f55d00405a63dec8dd2928e856fb18becff5
-
Filesize
99KB
MD5ac9682380b3c94ffe32d0aca1a53d53e
SHA17c1485c7d2720d433306ff5c86fd944331bc4447
SHA256cd0e4cd89551d243fd1365950d28470d56a09f29e834d13288f6ca1aff4c1626
SHA512978eaa0bfd1c62d4e7eaac0470ed29dfcc683aef8b087fbd76caf1218d700010d1bb2ae1d155811665e52c842326bef1779d082161b72c8c25c8e6167ea12eb9
-
Filesize
279KB
MD5c97ff984c8643e9a8404592683cd7162
SHA19f0e2724d047c794b4457fb799cc6e96438a7292
SHA2561c5529c199a8a1744246396812a2e90c847ca78a6a438592010fe1b0573fdf32
SHA512f18481023fc45bc8618dd2aa481d806d1c799b5a635ed2ad64be0ed3f26470330973bfa04a56349f8cc473761bab1ea1780d07c7d77b5895b4aef0219e7a4bf6
-
Filesize
1.9MB
MD5d9ace96249c677b8aa4cc881da8719bf
SHA1043ffe72edfdbbad5c903cc0828e359ee90752b4
SHA256d0272db66c37dcefb057951240329f371dad2bffd53bb999ce4ba915052438ce
SHA51254fca18a7beeaf1c38c833ee4511186dcf3b01f481496b60c165fe1bfab8da077bfdd22425af88833c7dcb6e879831eb69baa686d49b72fb1bee159b40017f0c