Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
11/09/2024, 09:27
Static task
static1
Behavioral task
behavioral1
Sample
da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe
-
Size
210KB
-
MD5
da0e0634bd512ff3d53355317dcd1252
-
SHA1
d4a6bf3f088a0c4a49f3313f1928695f4a0cee4b
-
SHA256
c63c39a9c5b8be2881c78bc831ac2ef1534cd7c616e611404def9dba5c35d7ac
-
SHA512
3080e1efa65735c37d43eb1a320e29de31a100e41686ee8c434f8add8627366d8747220fea6819cbbd2909bf8f0b55f80baa57af88ccc53272e7e8895acee9e1
-
SSDEEP
3072:UdaUGasvuYlywEJ1x6zGMYKvFhr6MyS4WDEmGKRG1tOKnB1rPpLHwzys:8Gaslywe1oNffxZG1xnfDtHns
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 2756 MsKjClient.exe -
Executes dropped EXE 52 IoCs
pid Process 2768 MsKjClient.exe 2756 MsKjClient.exe 2516 MsKjClient.exe 864 MsKjClient.exe 2544 MsKjClient.exe 604 MsKjClient.exe 2860 MsKjClient.exe 3024 MsKjClient.exe 1084 MsKjClient.exe 1492 MsKjClient.exe 2080 MsKjClient.exe 2176 MsKjClient.exe 1976 MsKjClient.exe 840 MsKjClient.exe 1792 MsKjClient.exe 828 MsKjClient.exe 1308 MsKjClient.exe 1948 MsKjClient.exe 1756 MsKjClient.exe 888 MsKjClient.exe 2760 MsKjClient.exe 2772 MsKjClient.exe 2768 MsKjClient.exe 2620 MsKjClient.exe 1864 MsKjClient.exe 2504 MsKjClient.exe 2716 MsKjClient.exe 2864 MsKjClient.exe 3012 MsKjClient.exe 2408 MsKjClient.exe 1084 MsKjClient.exe 884 MsKjClient.exe 2452 MsKjClient.exe 2376 MsKjClient.exe 1436 MsKjClient.exe 1372 MsKjClient.exe 1400 MsKjClient.exe 1076 MsKjClient.exe 876 MsKjClient.exe 1064 MsKjClient.exe 1148 MsKjClient.exe 2128 MsKjClient.exe 2804 MsKjClient.exe 1572 MsKjClient.exe 2916 MsKjClient.exe 2920 MsKjClient.exe 2264 MsKjClient.exe 2692 MsKjClient.exe 2736 MsKjClient.exe 2940 MsKjClient.exe 2204 MsKjClient.exe 2076 MsKjClient.exe -
Loads dropped DLL 52 IoCs
pid Process 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 2756 MsKjClient.exe 2756 MsKjClient.exe 864 MsKjClient.exe 864 MsKjClient.exe 604 MsKjClient.exe 604 MsKjClient.exe 3024 MsKjClient.exe 3024 MsKjClient.exe 1492 MsKjClient.exe 1492 MsKjClient.exe 2176 MsKjClient.exe 2176 MsKjClient.exe 840 MsKjClient.exe 840 MsKjClient.exe 828 MsKjClient.exe 828 MsKjClient.exe 1948 MsKjClient.exe 1948 MsKjClient.exe 888 MsKjClient.exe 888 MsKjClient.exe 2772 MsKjClient.exe 2772 MsKjClient.exe 2620 MsKjClient.exe 2620 MsKjClient.exe 2504 MsKjClient.exe 2504 MsKjClient.exe 2864 MsKjClient.exe 2864 MsKjClient.exe 2408 MsKjClient.exe 2408 MsKjClient.exe 884 MsKjClient.exe 884 MsKjClient.exe 2376 MsKjClient.exe 2376 MsKjClient.exe 1372 MsKjClient.exe 1372 MsKjClient.exe 1076 MsKjClient.exe 1076 MsKjClient.exe 1064 MsKjClient.exe 1064 MsKjClient.exe 2128 MsKjClient.exe 2128 MsKjClient.exe 1572 MsKjClient.exe 1572 MsKjClient.exe 2920 MsKjClient.exe 2920 MsKjClient.exe 2692 MsKjClient.exe 2692 MsKjClient.exe 2940 MsKjClient.exe 2940 MsKjClient.exe -
resource yara_rule behavioral1/memory/1936-6-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-4-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-11-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-10-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-9-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-8-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-2-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1936-24-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2756-33-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2756-36-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2756-35-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2756-34-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2756-42-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/864-53-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/864-60-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/604-71-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/604-77-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3024-88-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/3024-94-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1492-110-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2176-127-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/840-143-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/828-159-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1948-175-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/888-184-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/888-192-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2772-208-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2620-224-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2504-238-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2864-250-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2408-262-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/884-270-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/884-275-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2376-287-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1372-299-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1076-311-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1064-323-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2128-335-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/1572-347-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2920-359-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2692-371-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2940-380-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral1/memory/2940-384-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 54 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsKjClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsKjClient.exe -
Drops file in System32 directory 52 IoCs
description ioc Process File created C:\Windows\SysWOW64\MsKjClient.exe da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File opened for modification C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe File created C:\Windows\SysWOW64\MsKjClient.exe MsKjClient.exe -
Suspicious use of SetThreadContext 27 IoCs
description pid Process procid_target PID 2280 set thread context of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2768 set thread context of 2756 2768 MsKjClient.exe 32 PID 2516 set thread context of 864 2516 MsKjClient.exe 34 PID 2544 set thread context of 604 2544 MsKjClient.exe 36 PID 2860 set thread context of 3024 2860 MsKjClient.exe 38 PID 1084 set thread context of 1492 1084 MsKjClient.exe 41 PID 2080 set thread context of 2176 2080 MsKjClient.exe 43 PID 1976 set thread context of 840 1976 MsKjClient.exe 45 PID 1792 set thread context of 828 1792 MsKjClient.exe 47 PID 1308 set thread context of 1948 1308 MsKjClient.exe 49 PID 1756 set thread context of 888 1756 MsKjClient.exe 51 PID 2760 set thread context of 2772 2760 MsKjClient.exe 53 PID 2768 set thread context of 2620 2768 MsKjClient.exe 55 PID 1864 set thread context of 2504 1864 MsKjClient.exe 57 PID 2716 set thread context of 2864 2716 MsKjClient.exe 59 PID 3012 set thread context of 2408 3012 MsKjClient.exe 61 PID 1084 set thread context of 884 1084 MsKjClient.exe 63 PID 2452 set thread context of 2376 2452 MsKjClient.exe 65 PID 1436 set thread context of 1372 1436 MsKjClient.exe 67 PID 1400 set thread context of 1076 1400 MsKjClient.exe 69 PID 876 set thread context of 1064 876 MsKjClient.exe 71 PID 1148 set thread context of 2128 1148 MsKjClient.exe 73 PID 2804 set thread context of 1572 2804 MsKjClient.exe 75 PID 2916 set thread context of 2920 2916 MsKjClient.exe 77 PID 2264 set thread context of 2692 2264 MsKjClient.exe 79 PID 2736 set thread context of 2940 2736 MsKjClient.exe 81 PID 2204 set thread context of 2076 2204 MsKjClient.exe 83 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 53 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsKjClient.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 2756 MsKjClient.exe 864 MsKjClient.exe 604 MsKjClient.exe 3024 MsKjClient.exe 1492 MsKjClient.exe 2176 MsKjClient.exe 840 MsKjClient.exe 828 MsKjClient.exe 1948 MsKjClient.exe 888 MsKjClient.exe 2772 MsKjClient.exe 2620 MsKjClient.exe 2504 MsKjClient.exe 2864 MsKjClient.exe 2408 MsKjClient.exe 884 MsKjClient.exe 2376 MsKjClient.exe 1372 MsKjClient.exe 1076 MsKjClient.exe 1064 MsKjClient.exe 2128 MsKjClient.exe 1572 MsKjClient.exe 2920 MsKjClient.exe 2692 MsKjClient.exe 2940 MsKjClient.exe 2076 MsKjClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 2280 wrote to memory of 1936 2280 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 30 PID 1936 wrote to memory of 2768 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 31 PID 1936 wrote to memory of 2768 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 31 PID 1936 wrote to memory of 2768 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 31 PID 1936 wrote to memory of 2768 1936 da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe 31 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2768 wrote to memory of 2756 2768 MsKjClient.exe 32 PID 2756 wrote to memory of 2516 2756 MsKjClient.exe 33 PID 2756 wrote to memory of 2516 2756 MsKjClient.exe 33 PID 2756 wrote to memory of 2516 2756 MsKjClient.exe 33 PID 2756 wrote to memory of 2516 2756 MsKjClient.exe 33 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 2516 wrote to memory of 864 2516 MsKjClient.exe 34 PID 864 wrote to memory of 2544 864 MsKjClient.exe 35 PID 864 wrote to memory of 2544 864 MsKjClient.exe 35 PID 864 wrote to memory of 2544 864 MsKjClient.exe 35 PID 864 wrote to memory of 2544 864 MsKjClient.exe 35 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 2544 wrote to memory of 604 2544 MsKjClient.exe 36 PID 604 wrote to memory of 2860 604 MsKjClient.exe 37 PID 604 wrote to memory of 2860 604 MsKjClient.exe 37 PID 604 wrote to memory of 2860 604 MsKjClient.exe 37 PID 604 wrote to memory of 2860 604 MsKjClient.exe 37 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 2860 wrote to memory of 3024 2860 MsKjClient.exe 38 PID 3024 wrote to memory of 1084 3024 MsKjClient.exe 40 PID 3024 wrote to memory of 1084 3024 MsKjClient.exe 40 PID 3024 wrote to memory of 1084 3024 MsKjClient.exe 40 PID 3024 wrote to memory of 1084 3024 MsKjClient.exe 40 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1084 wrote to memory of 1492 1084 MsKjClient.exe 41 PID 1492 wrote to memory of 2080 1492 MsKjClient.exe 42 PID 1492 wrote to memory of 2080 1492 MsKjClient.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\da0e0634bd512ff3d53355317dcd1252_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Users\Admin\AppData\Local\Temp\DA0E06~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Users\Admin\AppData\Local\Temp\DA0E06~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:864 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:604 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1976 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:840 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1792 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:828 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1756 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2768 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2408 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1084 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:884 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2452 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1372 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1400 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1064 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1148 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2804 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1572 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2920 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2692 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2736 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\system32\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\MsKjClient.exe"C:\Windows\SysWOW64\MsKjClient.exe" C:\Windows\SysWOW64\MSKJCL~1.EXE54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5da0e0634bd512ff3d53355317dcd1252
SHA1d4a6bf3f088a0c4a49f3313f1928695f4a0cee4b
SHA256c63c39a9c5b8be2881c78bc831ac2ef1534cd7c616e611404def9dba5c35d7ac
SHA5123080e1efa65735c37d43eb1a320e29de31a100e41686ee8c434f8add8627366d8747220fea6819cbbd2909bf8f0b55f80baa57af88ccc53272e7e8895acee9e1