Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe
-
Size
185KB
-
MD5
e16e4bf03f7f05a58f518ea4eaaa1501
-
SHA1
050413902dbd7516a209e6749bf83802c2d075fc
-
SHA256
648d78489be85b1db3a8d8da1cf966d97f1d592f8586bdaff608c9afac671642
-
SHA512
fee88302c5ec0c2f9ca38876698863e1073e4b76b84b308434e13fa90ca33672537567526eabf283a233c34bab18686a0f7a36acc8c993d264de9bf5b1f9fa2e
-
SSDEEP
3072:EIDI05N6SGLUPSBEul2zBklsDNEnIkrsnn0UMPcSDM+1+IqewHcvBS9a3FA2YQCr:EI805onUP3rzOlshEI10UM7D8IqewHv3
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Executes dropped EXE 20 IoCs
pid Process 2712 globalpatch.exe 2764 globalpatch.exe 1176 globalpatch.exe 1888 globalpatch.exe 1512 globalpatch.exe 2512 globalpatch.exe 1892 globalpatch.exe 300 globalpatch.exe 1908 globalpatch.exe 2072 globalpatch.exe 976 globalpatch.exe 3064 globalpatch.exe 2724 globalpatch.exe 2856 globalpatch.exe 2516 globalpatch.exe 2684 globalpatch.exe 2744 globalpatch.exe 2836 globalpatch.exe 1512 globalpatch.exe 3036 globalpatch.exe -
Loads dropped DLL 64 IoCs
pid Process 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 2712 globalpatch.exe 2712 globalpatch.exe 2712 globalpatch.exe 2712 globalpatch.exe 2764 globalpatch.exe 2764 globalpatch.exe 2764 globalpatch.exe 2764 globalpatch.exe 1176 globalpatch.exe 1176 globalpatch.exe 1176 globalpatch.exe 1176 globalpatch.exe 1888 globalpatch.exe 1888 globalpatch.exe 1888 globalpatch.exe 1888 globalpatch.exe 1512 globalpatch.exe 1512 globalpatch.exe 1512 globalpatch.exe 1512 globalpatch.exe 2512 globalpatch.exe 2512 globalpatch.exe 2512 globalpatch.exe 2512 globalpatch.exe 1892 globalpatch.exe 1892 globalpatch.exe 1892 globalpatch.exe 1892 globalpatch.exe 300 globalpatch.exe 300 globalpatch.exe 300 globalpatch.exe 300 globalpatch.exe 1908 globalpatch.exe 1908 globalpatch.exe 1908 globalpatch.exe 1908 globalpatch.exe 2072 globalpatch.exe 2072 globalpatch.exe 2072 globalpatch.exe 2072 globalpatch.exe 976 globalpatch.exe 976 globalpatch.exe 976 globalpatch.exe 976 globalpatch.exe 3064 globalpatch.exe 3064 globalpatch.exe 3064 globalpatch.exe 3064 globalpatch.exe 2724 globalpatch.exe 2724 globalpatch.exe 2724 globalpatch.exe 2724 globalpatch.exe 2856 globalpatch.exe 2856 globalpatch.exe 2856 globalpatch.exe 2856 globalpatch.exe 2516 globalpatch.exe 2516 globalpatch.exe 2516 globalpatch.exe 2516 globalpatch.exe 2684 globalpatch.exe 2684 globalpatch.exe 2684 globalpatch.exe -
Drops file in System32 directory 32 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File created C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe File opened for modification C:\Windows\SysWOW64\globalpatch.exe globalpatch.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 3052 set thread context of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 2712 set thread context of 2764 2712 globalpatch.exe 33 PID 1176 set thread context of 1888 1176 globalpatch.exe 35 PID 1512 set thread context of 2512 1512 globalpatch.exe 37 PID 1892 set thread context of 300 1892 globalpatch.exe 39 PID 1908 set thread context of 2072 1908 globalpatch.exe 41 PID 976 set thread context of 3064 976 globalpatch.exe 43 PID 2724 set thread context of 2856 2724 globalpatch.exe 46 PID 2516 set thread context of 2684 2516 globalpatch.exe 48 PID 2744 set thread context of 2836 2744 globalpatch.exe 50 PID 1512 set thread context of 3036 1512 globalpatch.exe 52 -
System Location Discovery: System Language Discovery 1 TTPs 22 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language globalpatch.exe -
Suspicious use of SetWindowsHookEx 11 IoCs
pid Process 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 2712 globalpatch.exe 1176 globalpatch.exe 1512 globalpatch.exe 1892 globalpatch.exe 1908 globalpatch.exe 976 globalpatch.exe 2724 globalpatch.exe 2516 globalpatch.exe 2744 globalpatch.exe 1512 globalpatch.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 3052 wrote to memory of 2104 3052 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 31 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2104 wrote to memory of 2712 2104 e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe 32 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2712 wrote to memory of 2764 2712 globalpatch.exe 33 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 2764 wrote to memory of 1176 2764 globalpatch.exe 34 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1176 wrote to memory of 1888 1176 globalpatch.exe 35 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1888 wrote to memory of 1512 1888 globalpatch.exe 36 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37 PID 1512 wrote to memory of 2512 1512 globalpatch.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 440 "C:\Users\Admin\AppData\Local\Temp\e16e4bf03f7f05a58f518ea4eaaa1501_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1888 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1892 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:300 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2072 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2724 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\system32\globalpatch.exe 576 "C:\Windows\SysWOW64\globalpatch.exe"21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Windows\SysWOW64\globalpatch.exeC:\Windows\SysWOW64\globalpatch.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-3290804112-2823094203-3137964600-1000\699c4b9cdebca7aaea5193cae8a50098_94ea1d76-6d7e-4d9e-abc7-ef9a6a2a9269
Filesize50B
MD55b63d4dd8c04c88c0e30e494ec6a609a
SHA1884d5a8bdc25fe794dc22ef9518009dcf0069d09
SHA2564d93c22555b3169e5c13716ca59b8b22892c69b3025aea841afe5259698102fd
SHA51215ff8551ac6b9de978050569bcdc26f44dfc06a0eaf445ac70fd45453a21bdafa3e4c8b4857d6a1c3226f4102a639682bdfb71d7b255062fb81a51c9126896cb
-
Filesize
185KB
MD5e16e4bf03f7f05a58f518ea4eaaa1501
SHA1050413902dbd7516a209e6749bf83802c2d075fc
SHA256648d78489be85b1db3a8d8da1cf966d97f1d592f8586bdaff608c9afac671642
SHA512fee88302c5ec0c2f9ca38876698863e1073e4b76b84b308434e13fa90ca33672537567526eabf283a233c34bab18686a0f7a36acc8c993d264de9bf5b1f9fa2e