Analysis
-
max time kernel
148s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14-09-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe
-
Size
257KB
-
MD5
e08aed27b1e5b0506664aff7a195866a
-
SHA1
370e5d245a9c78fba5c459b983e3e98c72fd6fcd
-
SHA256
f96525ff562cc924d49640ea5d3739fecabf915e6872bca8166c01a5f5e9a703
-
SHA512
c0c77dcb230fa0d1b17756caebe4b411ec1d7fa0399653604ced7e3c394e8aea1282a1bb4e864575ea693b2ff30b789e012807f27efaa9e30fa84933d938d5e9
-
SSDEEP
6144:mUgaFWMtFBeh+OZb5NyL7tfQN5/inEaMadDKNa1aIfJCuXXXXXX:mKFWKBeh+OZWtfQunka1KNaT/XXXXXX
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 1804 firefoxV2.com 1276 firefoxV2.com 2012 firefoxV2.com 1332 firefoxV2.com 1564 firefoxV2.com 2060 firefoxV2.com 1292 firefoxV2.com 1648 firefoxV2.com 1760 firefoxV2.com 2980 firefoxV2.com -
Loads dropped DLL 20 IoCs
pid Process 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 1804 firefoxV2.com 1804 firefoxV2.com 1276 firefoxV2.com 1276 firefoxV2.com 2012 firefoxV2.com 2012 firefoxV2.com 1332 firefoxV2.com 1332 firefoxV2.com 1564 firefoxV2.com 1564 firefoxV2.com 2060 firefoxV2.com 2060 firefoxV2.com 1292 firefoxV2.com 1292 firefoxV2.com 1648 firefoxV2.com 1648 firefoxV2.com 1760 firefoxV2.com 1760 firefoxV2.com -
Writes to the Master Boot Record (MBR) 1 TTPs 11 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com File opened for modification \??\PhysicalDrive0 firefoxV2.com -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Runs .reg file with regedit 11 IoCs
pid Process 1908 regedit.exe 2676 regedit.exe 2196 regedit.exe 1320 regedit.exe 2884 regedit.exe 3052 regedit.exe 1000 regedit.exe 1780 regedit.exe 2872 regedit.exe 2504 regedit.exe 2180 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2728 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2728 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2728 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 30 PID 2264 wrote to memory of 2728 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 30 PID 2728 wrote to memory of 2872 2728 cmd.exe 31 PID 2728 wrote to memory of 2872 2728 cmd.exe 31 PID 2728 wrote to memory of 2872 2728 cmd.exe 31 PID 2728 wrote to memory of 2872 2728 cmd.exe 31 PID 2264 wrote to memory of 1804 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 32 PID 2264 wrote to memory of 1804 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 32 PID 2264 wrote to memory of 1804 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 32 PID 2264 wrote to memory of 1804 2264 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 32 PID 1804 wrote to memory of 1080 1804 firefoxV2.com 33 PID 1804 wrote to memory of 1080 1804 firefoxV2.com 33 PID 1804 wrote to memory of 1080 1804 firefoxV2.com 33 PID 1804 wrote to memory of 1080 1804 firefoxV2.com 33 PID 1080 wrote to memory of 2504 1080 cmd.exe 34 PID 1080 wrote to memory of 2504 1080 cmd.exe 34 PID 1080 wrote to memory of 2504 1080 cmd.exe 34 PID 1080 wrote to memory of 2504 1080 cmd.exe 34 PID 1804 wrote to memory of 1276 1804 firefoxV2.com 35 PID 1804 wrote to memory of 1276 1804 firefoxV2.com 35 PID 1804 wrote to memory of 1276 1804 firefoxV2.com 35 PID 1804 wrote to memory of 1276 1804 firefoxV2.com 35 PID 1276 wrote to memory of 1952 1276 firefoxV2.com 36 PID 1276 wrote to memory of 1952 1276 firefoxV2.com 36 PID 1276 wrote to memory of 1952 1276 firefoxV2.com 36 PID 1276 wrote to memory of 1952 1276 firefoxV2.com 36 PID 1952 wrote to memory of 2180 1952 cmd.exe 37 PID 1952 wrote to memory of 2180 1952 cmd.exe 37 PID 1952 wrote to memory of 2180 1952 cmd.exe 37 PID 1952 wrote to memory of 2180 1952 cmd.exe 37 PID 1276 wrote to memory of 2012 1276 firefoxV2.com 38 PID 1276 wrote to memory of 2012 1276 firefoxV2.com 38 PID 1276 wrote to memory of 2012 1276 firefoxV2.com 38 PID 1276 wrote to memory of 2012 1276 firefoxV2.com 38 PID 2012 wrote to memory of 2828 2012 firefoxV2.com 39 PID 2012 wrote to memory of 2828 2012 firefoxV2.com 39 PID 2012 wrote to memory of 2828 2012 firefoxV2.com 39 PID 2012 wrote to memory of 2828 2012 firefoxV2.com 39 PID 2828 wrote to memory of 1320 2828 cmd.exe 40 PID 2828 wrote to memory of 1320 2828 cmd.exe 40 PID 2828 wrote to memory of 1320 2828 cmd.exe 40 PID 2828 wrote to memory of 1320 2828 cmd.exe 40 PID 2012 wrote to memory of 1332 2012 firefoxV2.com 41 PID 2012 wrote to memory of 1332 2012 firefoxV2.com 41 PID 2012 wrote to memory of 1332 2012 firefoxV2.com 41 PID 2012 wrote to memory of 1332 2012 firefoxV2.com 41 PID 1332 wrote to memory of 3056 1332 firefoxV2.com 42 PID 1332 wrote to memory of 3056 1332 firefoxV2.com 42 PID 1332 wrote to memory of 3056 1332 firefoxV2.com 42 PID 1332 wrote to memory of 3056 1332 firefoxV2.com 42 PID 3056 wrote to memory of 2884 3056 cmd.exe 43 PID 3056 wrote to memory of 2884 3056 cmd.exe 43 PID 3056 wrote to memory of 2884 3056 cmd.exe 43 PID 3056 wrote to memory of 2884 3056 cmd.exe 43 PID 1332 wrote to memory of 1564 1332 firefoxV2.com 44 PID 1332 wrote to memory of 1564 1332 firefoxV2.com 44 PID 1332 wrote to memory of 1564 1332 firefoxV2.com 44 PID 1332 wrote to memory of 1564 1332 firefoxV2.com 44 PID 1564 wrote to memory of 2956 1564 firefoxV2.com 45 PID 1564 wrote to memory of 2956 1564 firefoxV2.com 45 PID 1564 wrote to memory of 2956 1564 firefoxV2.com 45 PID 1564 wrote to memory of 2956 1564 firefoxV2.com 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2872
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 532 "C:\Users\Admin\AppData\Local\Temp\e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2504
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 556 "C:\Windows\SysWOW64\firefoxV2.com"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2180
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 564 "C:\Windows\SysWOW64\firefoxV2.com"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1320
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 560 "C:\Windows\SysWOW64\firefoxV2.com"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1332 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2884
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 568 "C:\Windows\SysWOW64\firefoxV2.com"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat7⤵
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3052
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 576 "C:\Windows\SysWOW64\firefoxV2.com"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat8⤵
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1000
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 572 "C:\Windows\SysWOW64\firefoxV2.com"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat9⤵
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1908
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 580 "C:\Windows\SysWOW64\firefoxV2.com"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat10⤵
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2676
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 584 "C:\Windows\SysWOW64\firefoxV2.com"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat11⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1780
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 588 "C:\Windows\SysWOW64\firefoxV2.com"11⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c c:\v.bat12⤵
- System Location Discovery: System Language Discovery
PID:1716 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2196
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d085cde42c14e8ee2a5e8870d08aee42
SHA1c8e967f1d301f97dbcf252d7e1677e590126f994
SHA256a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f
SHA512de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b
-
Filesize
2KB
MD56bf876cd9994f0d41be4eca36d22c42a
SHA150cda4b940e6ba730ce59000cfc59e6c4d7fdc79
SHA256ff39ffe6e43e9b293c5be6aa85345e868a27215293e750c00e1e0ba676deeb2a
SHA512605e2920cd230b6c617a2d4153f23144954cd4bae0f66b857e1b334cd66258fbc5ba049c1ab6ab83c30fd54c87235a115ec7bbfd17d6792a4bbbae4c6700e106
-
Filesize
360B
MD53a1a83c2ffad464e87a2f9a502b7b9f1
SHA14ffa65ecdd0455499c8cd6d05947605340cbf426
SHA25673ed949fba75a20288ac2d1e367180d4c8837fd31c66143707768d5b0e3bd8b6
SHA5128232967faaf29b8b93b5042ba2bb1fcb6d0f0f2fa0e19573b1fe49f526ba434c5e76e932829e3c71beb0903e42c293ed202b619fee8aba93efe4a99e8aec55e2
-
Filesize
3KB
MD5872656500ddac1ddd91d10aba3a8df96
SHA1ddf655aea7e8eae37b0a2dd4c8cabaf21cf681fc
SHA256d6f58d2fbf733d278281af0b9e7732a591cdd752e18a430f76cb7afa806c75f8
SHA512e7fab32f6f38bde67c8ce7af483216c9965ab62a70aee5c9a9e17aa693c33c67953f817406c1687406977b234d89e62d7feb44757527de5db34e5a61462a0be9
-
Filesize
1KB
MD53bd23392c6fcc866c4561388c1dc72ac
SHA1c4b1462473f1d97fed434014532ea344b8fc05c1
SHA256696a382790ee24d6256b3618b1431eaf14c510a12ff2585edfeae430024c7a43
SHA51215b3a33bb5d5d6e6b149773ff47ade4f22271264f058ad8439403df71d6ecfaa2729ef48487f43d68b517b15efed587b368bc6c5df549983de410ec23b55adb1
-
Filesize
1KB
MD5f31b2aa720a1c523c1e36a40ef21ee0d
SHA19c8089896c55e6e6a9cca99b1b98c544723d314e
SHA256cea90761ea6ef6fb8ac98484b5720392534a9774e884c3e343ae29559aa0a716
SHA512a679ce1192e15cd9b8dd4a3d7ecf85707ec23fa944c020b226172497c0b5600460558cfa9304ddf2c582a95e0fcd7f1b26004c8fba0ed9afcddc6ded770c85bb
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
182B
MD509e45f09a25fed7995c8430f4a370ade
SHA1fc49fec86e600a7c4e1b6bfa274f883635d65687
SHA256f827e79f717d490ba61a9ec5f8198ebc3066e22fd25871f06ce15f04162f57b9
SHA5121a6ed68eced45f30fff3f281ceb082d6ae9e13bc71f6f7da5b4ba064e9876ef7efd76eaffe1325f6e3dfa3a5429200302ea84915245f26ac393105fd1ec365ad
-
Filesize
298B
MD54117e5a9c995bab9cd3bce3fc2b99a46
SHA180144ccbad81c2efb1df64e13d3d5f59ca4486da
SHA25637b58c2d66ab2f896316ee0cdba30dcc9aac15a51995b8ba6c143c8ba34bf292
SHA512bdb721bd3dea641a9b1f26b46311c05199de01c6b0d7ea2b973aa71a4f796b292a6964ddef32ba9dfc4a545768943d105f110c5d60716e0ff6f82914affb507c
-
Filesize
574B
MD55020988c301a6bf0c54a293ddf64837c
SHA15b65e689a2988b9a739d53565b2a847f20d70f09
SHA256a123ebc1fac86713cdd7c4a511e022783a581ea02ba65ea18360555706ae5f2d
SHA512921a07597f8c82c65c675f5b09a2552c7e2e8c65c8df59eebbe9aff0bfe439ad93f5efc97ba521be31299323051d61ead6a3f0be27302dc0f728b7a844fb2fcf
-
Filesize
3KB
MD51daa413d1a8cd1692f2e4ae22b54c74a
SHA12e02e2a23cfaa62f301e29a117e291ff93cc5d31
SHA25610732e2612780d9694faf0bb9b27cdc6f3376ad327da7dfc346e9e5579493d33
SHA512b947c70c7c4af971e3fbdc66fb7175b6624ac68c6a723dac7ecb5cf5f43bbe210fa0fa61fd4b6153dccf7de077d003ca03f061e209dc37773546b038e6aef277
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
257KB
MD5e08aed27b1e5b0506664aff7a195866a
SHA1370e5d245a9c78fba5c459b983e3e98c72fd6fcd
SHA256f96525ff562cc924d49640ea5d3739fecabf915e6872bca8166c01a5f5e9a703
SHA512c0c77dcb230fa0d1b17756caebe4b411ec1d7fa0399653604ced7e3c394e8aea1282a1bb4e864575ea693b2ff30b789e012807f27efaa9e30fa84933d938d5e9