Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
12/09/2024, 03:49
Static task
static1
Behavioral task
behavioral1
Sample
dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe
-
Size
56KB
-
MD5
dbc24cc44d3682623968b01659fba77c
-
SHA1
38890157e7e892072c2d66c3687c203e1df5523d
-
SHA256
ea39f5f38bd536757c0f1ec97db474300de7040b3c3f0829d35d4cc8ca140de8
-
SHA512
9b487798442f98ce92b4933618073d0a6fd7c8c39e65debc8a80e08eb2a182126d6913cb072269c6f2efbfc7647c36a274e0fdcf8485fd41474f6d01040da8aa
-
SSDEEP
1536:E0nuJ0pmaxxtP8S5y7xcAzzZFQXV8zm6mWY:E0uJ0caxT8A+vzgyzHmH
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Executes dropped EXE 2 IoCs
pid Process 3916 SETUP.EXE 3276 svteppsk.exe -
resource yara_rule behavioral2/memory/3916-4-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/files/0x000900000002340e-3.dat upx behavioral2/memory/3916-10-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral2/memory/3276-12-0x0000000000400000-0x0000000000410000-memory.dmp upx -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svtepps.dll SETUP.EXE File created C:\Windows\SysWOW64\svteppsk.exe SETUP.EXE File opened for modification C:\Windows\SysWOW64\svteppsk.exe SETUP.EXE -
Launches sc.exe 4 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1828 sc.exe 224 sc.exe 1984 sc.exe 1908 sc.exe -
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SETUP.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svteppsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NET.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe -
Kills process with taskkill 8 IoCs
pid Process 1664 taskkill.exe 1896 taskkill.exe 4900 taskkill.exe 2916 taskkill.exe 3224 taskkill.exe 1892 taskkill.exe 1996 taskkill.exe 2240 taskkill.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 20 IoCs
description pid Process Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe Token: SeDebugPrivilege 2240 taskkill.exe Token: SeDebugPrivilege 1664 taskkill.exe Token: SeDebugPrivilege 4900 taskkill.exe Token: SeDebugPrivilege 1996 taskkill.exe Token: SeDebugPrivilege 1892 taskkill.exe Token: SeDebugPrivilege 3224 taskkill.exe Token: SeDebugPrivilege 2916 taskkill.exe Token: SeDebugPrivilege 1896 taskkill.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1840 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 83 PID 2172 wrote to memory of 1840 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 83 PID 2172 wrote to memory of 1840 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 83 PID 2172 wrote to memory of 1648 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 84 PID 2172 wrote to memory of 1648 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 84 PID 2172 wrote to memory of 1648 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 84 PID 2172 wrote to memory of 4036 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 85 PID 2172 wrote to memory of 4036 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 85 PID 2172 wrote to memory of 4036 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 85 PID 2172 wrote to memory of 224 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 86 PID 2172 wrote to memory of 224 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 86 PID 2172 wrote to memory of 224 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 86 PID 2172 wrote to memory of 2240 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 87 PID 2172 wrote to memory of 2240 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 87 PID 2172 wrote to memory of 2240 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 87 PID 2172 wrote to memory of 1996 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 88 PID 2172 wrote to memory of 1996 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 88 PID 2172 wrote to memory of 1996 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 88 PID 2172 wrote to memory of 1828 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 89 PID 2172 wrote to memory of 1828 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 89 PID 2172 wrote to memory of 1828 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 89 PID 2172 wrote to memory of 1892 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 90 PID 2172 wrote to memory of 1892 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 90 PID 2172 wrote to memory of 1892 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 90 PID 2172 wrote to memory of 3224 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 91 PID 2172 wrote to memory of 3224 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 91 PID 2172 wrote to memory of 3224 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 91 PID 2172 wrote to memory of 2012 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 92 PID 2172 wrote to memory of 2012 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 92 PID 2172 wrote to memory of 2012 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 92 PID 2172 wrote to memory of 452 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 93 PID 2172 wrote to memory of 452 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 93 PID 2172 wrote to memory of 452 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 93 PID 2172 wrote to memory of 980 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 94 PID 2172 wrote to memory of 980 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 94 PID 2172 wrote to memory of 980 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 94 PID 2172 wrote to memory of 1908 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 95 PID 2172 wrote to memory of 1908 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 95 PID 2172 wrote to memory of 1908 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 95 PID 2172 wrote to memory of 2916 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 96 PID 2172 wrote to memory of 2916 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 96 PID 2172 wrote to memory of 2916 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 96 PID 2172 wrote to memory of 4900 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 97 PID 2172 wrote to memory of 4900 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 97 PID 2172 wrote to memory of 4900 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 97 PID 2172 wrote to memory of 1984 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 98 PID 2172 wrote to memory of 1984 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 98 PID 2172 wrote to memory of 1984 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 98 PID 2172 wrote to memory of 1896 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 99 PID 2172 wrote to memory of 1896 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 99 PID 2172 wrote to memory of 1896 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 99 PID 2172 wrote to memory of 1664 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 100 PID 2172 wrote to memory of 1664 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 100 PID 2172 wrote to memory of 1664 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 100 PID 2172 wrote to memory of 3916 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 109 PID 2172 wrote to memory of 3916 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 109 PID 2172 wrote to memory of 3916 2172 dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe 109 PID 3916 wrote to memory of 3276 3916 SETUP.EXE 120 PID 3916 wrote to memory of 3276 3916 SETUP.EXE 120 PID 3916 wrote to memory of 3276 3916 SETUP.EXE 120 PID 1648 wrote to memory of 2640 1648 net.exe 121 PID 1648 wrote to memory of 2640 1648 net.exe 121 PID 1648 wrote to memory of 2640 1648 net.exe 121 PID 1840 wrote to memory of 4848 1840 net.exe 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbc24cc44d3682623968b01659fba77c_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\net.exenet stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:4848
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"3⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP sYSTEM rESTORE sERVICE2⤵
- System Location Discovery: System Language Discovery
PID:4036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP sYSTEM rESTORE sERVICE3⤵
- System Location Discovery: System Language Discovery
PID:4152
-
-
-
C:\Windows\SysWOW64\sc.exesc config NOD32krn start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:224
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im nod32krn.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2240
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im nod32kui.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1892
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im egui.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:3224
-
-
C:\Windows\SysWOW64\net.exenet stop "Security Center"2⤵
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Security Center"3⤵
- System Location Discovery: System Language Discovery
PID:5080
-
-
-
C:\Windows\SysWOW64\net.exenet stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"2⤵
- System Location Discovery: System Language Discovery
PID:452 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop "Windows FirewaLL/iNTERNET cONNECTION sHARING (ics)"3⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP sYSTEM rESTORE sERVICE2⤵
- System Location Discovery: System Language Discovery
PID:980 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP sYSTEM rESTORE sERVICE3⤵
- System Location Discovery: System Language Discovery
PID:1060
-
-
-
C:\Windows\SysWOW64\sc.exesc config NOD32krn start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1908
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im nod32krn.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im nod32kui.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:4900
-
-
C:\Windows\SysWOW64\sc.exesc config ekrn start= disabled2⤵
- Launches sc.exe
- System Location Discovery: System Language Discovery
PID:1984
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im ekrn.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1896
-
-
C:\Windows\SysWOW64\taskkill.exetaskkill /im egui.exe /f2⤵
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\SETUP.EXEC:\Users\Admin\AppData\Local\Temp\SETUP.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\svteppsk.exeC:\Windows\system32\svteppsk.exe ˜‰3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3276
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\SETUP.EXE.bat3⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del C:\avp.exe2⤵
- System Location Discovery: System Language Discovery
PID:2120
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5736514b0622bb734aebe6071b4eda0fb
SHA1386254bf5d0cab858a9c17731ceaa5f9880516f3
SHA256208d4dabe00abec15c53a97ede69fa5a347f37ffcef1754ef31c8cce1490ca9a
SHA512fb969dfaedce396d25ac4709d2ecf1fc16a7fffc9cdbb8a799a340d57f57ae543daf985378da8f7565f6d907c75a8cfa480eb49e582e1dc794e51037a7c704cb
-
Filesize
128B
MD5c42148a730cc3231cdc421c30033516c
SHA1d80ff4d040369eed0cf83cd6b1ec8647874463c0
SHA256c324b1277868440049c34e99429f60825ec73fbc818fb1a15d0ffb8ab0a879a7
SHA51236ffd9dbba49fe51a5d6f96408127710821f99edc27954a8a78c94994061f1e7365b994428cd5bb3abe4d75421555b2509719737bde0d52d2c973fbe9771d494