Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
14-09-2024 16:08
Static task
static1
Behavioral task
behavioral1
Sample
e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe
-
Size
257KB
-
MD5
e08aed27b1e5b0506664aff7a195866a
-
SHA1
370e5d245a9c78fba5c459b983e3e98c72fd6fcd
-
SHA256
f96525ff562cc924d49640ea5d3739fecabf915e6872bca8166c01a5f5e9a703
-
SHA512
c0c77dcb230fa0d1b17756caebe4b411ec1d7fa0399653604ced7e3c394e8aea1282a1bb4e864575ea693b2ff30b789e012807f27efaa9e30fa84933d938d5e9
-
SSDEEP
6144:mUgaFWMtFBeh+OZb5NyL7tfQN5/inEaMadDKNa1aIfJCuXXXXXX:mKFWKBeh+OZWtfQunka1KNaT/XXXXXX
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 3436 firefoxV2.com 4836 firefoxV2.com 2152 firefoxV2.com 3024 firefoxV2.com 1896 firefoxV2.com 764 firefoxV2.com 924 firefoxV2.com 796 firefoxV2.com 2672 firefoxV2.com 3644 firefoxV2.com -
Drops file in System32 directory 32 IoCs
description ioc Process File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\firefoxV2.com e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File opened for modification C:\Windows\SysWOW64\aspr_keys.ini firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com File created C:\Windows\SysWOW64\firefoxV2.com firefoxV2.com -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language firefoxV2.com -
Runs .reg file with regedit 11 IoCs
pid Process 3512 regedit.exe 4976 regedit.exe 3536 regedit.exe 3548 regedit.exe 3776 regedit.exe 3144 regedit.exe 1576 regedit.exe 3680 regedit.exe 2312 regedit.exe 4492 regedit.exe 4560 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4520 wrote to memory of 3720 4520 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 88 PID 4520 wrote to memory of 3720 4520 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 88 PID 4520 wrote to memory of 3720 4520 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 88 PID 3720 wrote to memory of 3144 3720 cmd.exe 89 PID 3720 wrote to memory of 3144 3720 cmd.exe 89 PID 3720 wrote to memory of 3144 3720 cmd.exe 89 PID 4520 wrote to memory of 3436 4520 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 90 PID 4520 wrote to memory of 3436 4520 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 90 PID 4520 wrote to memory of 3436 4520 e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe 90 PID 3436 wrote to memory of 1344 3436 firefoxV2.com 91 PID 3436 wrote to memory of 1344 3436 firefoxV2.com 91 PID 3436 wrote to memory of 1344 3436 firefoxV2.com 91 PID 1344 wrote to memory of 4492 1344 cmd.exe 92 PID 1344 wrote to memory of 4492 1344 cmd.exe 92 PID 1344 wrote to memory of 4492 1344 cmd.exe 92 PID 3436 wrote to memory of 4836 3436 firefoxV2.com 104 PID 3436 wrote to memory of 4836 3436 firefoxV2.com 104 PID 3436 wrote to memory of 4836 3436 firefoxV2.com 104 PID 4836 wrote to memory of 2044 4836 firefoxV2.com 105 PID 4836 wrote to memory of 2044 4836 firefoxV2.com 105 PID 4836 wrote to memory of 2044 4836 firefoxV2.com 105 PID 2044 wrote to memory of 4560 2044 cmd.exe 106 PID 2044 wrote to memory of 4560 2044 cmd.exe 106 PID 2044 wrote to memory of 4560 2044 cmd.exe 106 PID 4836 wrote to memory of 2152 4836 firefoxV2.com 108 PID 4836 wrote to memory of 2152 4836 firefoxV2.com 108 PID 4836 wrote to memory of 2152 4836 firefoxV2.com 108 PID 2152 wrote to memory of 1092 2152 firefoxV2.com 109 PID 2152 wrote to memory of 1092 2152 firefoxV2.com 109 PID 2152 wrote to memory of 1092 2152 firefoxV2.com 109 PID 1092 wrote to memory of 1576 1092 cmd.exe 110 PID 1092 wrote to memory of 1576 1092 cmd.exe 110 PID 1092 wrote to memory of 1576 1092 cmd.exe 110 PID 2152 wrote to memory of 3024 2152 firefoxV2.com 112 PID 2152 wrote to memory of 3024 2152 firefoxV2.com 112 PID 2152 wrote to memory of 3024 2152 firefoxV2.com 112 PID 3024 wrote to memory of 4740 3024 firefoxV2.com 113 PID 3024 wrote to memory of 4740 3024 firefoxV2.com 113 PID 3024 wrote to memory of 4740 3024 firefoxV2.com 113 PID 4740 wrote to memory of 3680 4740 cmd.exe 114 PID 4740 wrote to memory of 3680 4740 cmd.exe 114 PID 4740 wrote to memory of 3680 4740 cmd.exe 114 PID 3024 wrote to memory of 1896 3024 firefoxV2.com 115 PID 3024 wrote to memory of 1896 3024 firefoxV2.com 115 PID 3024 wrote to memory of 1896 3024 firefoxV2.com 115 PID 1896 wrote to memory of 3548 1896 firefoxV2.com 116 PID 1896 wrote to memory of 3548 1896 firefoxV2.com 116 PID 1896 wrote to memory of 3548 1896 firefoxV2.com 116 PID 3548 wrote to memory of 3512 3548 cmd.exe 117 PID 3548 wrote to memory of 3512 3548 cmd.exe 117 PID 3548 wrote to memory of 3512 3548 cmd.exe 117 PID 1896 wrote to memory of 764 1896 firefoxV2.com 118 PID 1896 wrote to memory of 764 1896 firefoxV2.com 118 PID 1896 wrote to memory of 764 1896 firefoxV2.com 118 PID 764 wrote to memory of 4684 764 firefoxV2.com 119 PID 764 wrote to memory of 4684 764 firefoxV2.com 119 PID 764 wrote to memory of 4684 764 firefoxV2.com 119 PID 4684 wrote to memory of 4976 4684 cmd.exe 120 PID 4684 wrote to memory of 4976 4684 cmd.exe 120 PID 4684 wrote to memory of 4976 4684 cmd.exe 120 PID 764 wrote to memory of 924 764 firefoxV2.com 121 PID 764 wrote to memory of 924 764 firefoxV2.com 121 PID 764 wrote to memory of 924 764 firefoxV2.com 121 PID 924 wrote to memory of 756 924 firefoxV2.com 122
Processes
-
C:\Users\Admin\AppData\Local\Temp\e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3720 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3144
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1140 "C:\Users\Admin\AppData\Local\Temp\e08aed27b1e5b0506664aff7a195866a_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4492
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1208 "C:\Windows\SysWOW64\firefoxV2.com"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4560
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1180 "C:\Windows\SysWOW64\firefoxV2.com"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1576
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1188 "C:\Windows\SysWOW64\firefoxV2.com"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3680
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1192 "C:\Windows\SysWOW64\firefoxV2.com"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3512
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1196 "C:\Windows\SysWOW64\firefoxV2.com"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4976
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1184 "C:\Windows\SysWOW64\firefoxV2.com"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:924 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat9⤵
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3536
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1200 "C:\Windows\SysWOW64\firefoxV2.com"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat10⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3548
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1212 "C:\Windows\SysWOW64\firefoxV2.com"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat11⤵
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2312
-
-
-
C:\Windows\SysWOW64\firefoxV2.comC:\Windows\system32\firefoxV2.com 1204 "C:\Windows\SysWOW64\firefoxV2.com"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3644 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\v.bat12⤵
- System Location Discovery: System Language Discovery
PID:4484 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3776
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4436,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=4400 /prefetch:81⤵PID:4464
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55f6aefafda312b288b7d555c1fc36dc9
SHA1f25e2fdea9dd714d0fae68af71cace7bb49302ce
SHA25660f6d3cbf831857bf18e46a43ff403a03e2035d9430a72d768ea9cec1947917a
SHA51297f0250ba79b008d7632a2f32a7b851d9ca87f116b2854d5343c120511cfd55551a1f3eb3e0959602656b39b3f86003a0f9d04243ceb8b73d28eb9bb9449a6de
-
Filesize
784B
MD55a466127fedf6dbcd99adc917bd74581
SHA1a2e60b101c8789b59360d95a64ec07d0723c4d38
SHA2568cd3b8dd28ac014cf973d9ab4b03af1c274bbc9b5ee0ee4ab8af0bdb01573b84
SHA512695cafc932bc8f0a514bc515860cb275297665de63ca3394b55f42c457761ebf654d29d504674681a77b34e3356a469e8c5b97ff7efc24de330d5375f025cba5
-
Filesize
925B
MD50d1e5715cf04d212bcd7c9dea5f7ab72
SHA1a8add44bf542e4d22260a13de6a35704fb7f3bfb
SHA2565d1fc763bce7a43e9e47a75ddb116b7e5d077cc5541c55bc06f2951105b88473
SHA51289da5156b2021e4279d7fb8e3bf0196495f84d9aa04c921533d609f02b1b3edd29de80d5930483b914fe82f5fc319993f7fcd925ca22351fccd56c82652f2117
-
Filesize
3KB
MD5752fd85212d47da8f0adc29004a573b2
SHA1fa8fe3ff766601db46412879dc13dbec8d055965
SHA2569faa69e9dabfb4beb40790bf12d0ae2ac0a879fb045e38c03b9e4d0ab569636e
SHA512d7bbadb2ed764717dc01b012832e5c1debd6615bbdc121b5954e61d6364a03b2dd03718bdea26c5c2a6dbb6e33c5a7657c76862f6d8c0a916f7a0f9f8dd3b209
-
Filesize
3KB
MD51daa413d1a8cd1692f2e4ae22b54c74a
SHA12e02e2a23cfaa62f301e29a117e291ff93cc5d31
SHA25610732e2612780d9694faf0bb9b27cdc6f3376ad327da7dfc346e9e5579493d33
SHA512b947c70c7c4af971e3fbdc66fb7175b6624ac68c6a723dac7ecb5cf5f43bbe210fa0fa61fd4b6153dccf7de077d003ca03f061e209dc37773546b038e6aef277
-
Filesize
2KB
MD5f82bc8865c1f6bf7125563479421f95c
SHA165c25d7af3ab1f29ef2ef1fdc67378ac9c82098d
SHA256f9799dc2afb8128d1925b69fdef1d641f312ed41254dd5f4ac543cf50648a2f6
SHA51200a9b7798a630779dc30296c3d0fed2589e7e86d6941f4502ea301c5bce2e80a5d8a4916e36183c7064f968b539ae6dac49094b1de3643a1a2fedc83cf558825
-
Filesize
1KB
MD5f31b2aa720a1c523c1e36a40ef21ee0d
SHA19c8089896c55e6e6a9cca99b1b98c544723d314e
SHA256cea90761ea6ef6fb8ac98484b5720392534a9774e884c3e343ae29559aa0a716
SHA512a679ce1192e15cd9b8dd4a3d7ecf85707ec23fa944c020b226172497c0b5600460558cfa9304ddf2c582a95e0fcd7f1b26004c8fba0ed9afcddc6ded770c85bb
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
476B
MD5a5d4cddfecf34e5391a7a3df62312327
SHA104a3c708bab0c15b6746cf9dbf41a71c917a98b9
SHA2568961a4310b2413753851ba8afe2feb4c522c20e856c6a98537d8ab440f48853a
SHA51248024549d0fcb88e3bd46f7fb42715181142cae764a3daeb64cad07f10cf3bf14153731aeafba9a191557e29ddf1c5b62a460588823df215e2246eddaeff6643
-
Filesize
1KB
MD547985593a44ee38c64665b04cbd4b84c
SHA184900c2b2e116a7b744730733f63f2a38b4eb76e
SHA2564a62e43cadba3b8fa2ebead61f9509107d8453a6d66917aad5efab391a8f8e70
SHA512abdd7f2f701a5572fd6b8b73ff4a013c1f9b157b20f4e193f9d1ed2b3ac4911fa36ffc84ca62d2ceea752a65af34ec77e3766e97e396a8470031990faff1a269
-
Filesize
257KB
MD5e08aed27b1e5b0506664aff7a195866a
SHA1370e5d245a9c78fba5c459b983e3e98c72fd6fcd
SHA256f96525ff562cc924d49640ea5d3739fecabf915e6872bca8166c01a5f5e9a703
SHA512c0c77dcb230fa0d1b17756caebe4b411ec1d7fa0399653604ced7e3c394e8aea1282a1bb4e864575ea693b2ff30b789e012807f27efaa9e30fa84933d938d5e9
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904