Resubmissions
18-09-2024 11:32
240918-nnmz7azakp 1015-09-2024 12:50
240915-p21c4svflm 1015-09-2024 12:44
240915-pysh4atflf 1015-09-2024 12:04
240915-n83ldatdpl 10Analysis
-
max time kernel
89s -
max time network
92s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
15-09-2024 12:44
Behavioral task
behavioral1
Sample
e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe
Resource
win11-20240802-en
General
-
Target
e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe
-
Size
165KB
-
MD5
e2708d3c57b562b01da42f9e7549781f
-
SHA1
3d82951dbfab5629187b26ecb7388b7a05597f67
-
SHA256
d976a41f366fb1e3a0a5d15878d84e24704949973d9e0ccead9a779dee03ef0f
-
SHA512
c483968f981e64021025bf4f42424df3cfb88a55bd4cb7f2aa904515eccb85e239c3d44812b28d5b617b6b8476dcc3f4258465a211ae6e6725adbf1850234619
-
SSDEEP
3072:eCEq0R0nZ5ys5n4Y9doh7O79siUs/NaxohzDKMlt:lw02sJPi7O93N3FHlt
Malware Config
Extracted
C:\Users\82iq912j-readme.txt
sodinokibi
http://aplebzu47wgazapdqks6vrcv6zcnjppkbxbr6wketf56nf6aq2nmyoyd.onion/172B6E645B562FA8
http://decryptor.top/172B6E645B562FA8
Signatures
-
Sodin,Sodinokibi,REvil
Ransomware with advanced anti-analysis and privilege escalation functionality.
-
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\E: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\W: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\N: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\R: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\B: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\I: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\V: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\Y: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\U: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\X: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\D: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\P: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\Q: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\J: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\T: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\M: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\O: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\S: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\H: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\K: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\L: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\Z: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\A: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened (read-only) \??\G: e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\645e7g8.bmp" e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification \??\c:\program files\CheckpointFormat.TTS e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\SkipOut.fon e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\GrantOptimize.tiff e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\PingSkip.rmi e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\SuspendOut.rtf e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\ApproveMeasure.ppsx e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\ClearRepair.7z e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\ConfirmConvertTo.vdx e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\GrantResume.contact e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\MoveClear.search-ms e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\RestartMove.xla e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\EnterJoin.xps e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\LimitReset.xht e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\RestartFind.wmf e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File created \??\c:\program files\82iq912j-readme.txt e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\MountSelect.jfif e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\TestRedo.scf e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File created \??\c:\program files (x86)\82iq912j-readme.txt e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\GrantMove.mov e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\WriteSet.cfg e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\UnprotectFormat.potx e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\BackupUse.3g2 e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertToTest.wpl e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\GroupAssert.asx e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\MergeClose.tif e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\SelectUpdate.tiff e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\UnblockSave.pdf e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\CompressInvoke.wm e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\ConvertFromGet.txt e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\GetEdit.kix e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\SendStart.midi e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe File opened for modification \??\c:\program files\WaitRemove.ram e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RdrCEF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2012 AcroRd32.exe 3824 WINWORD.EXE -
Checks processor information in registry 2 TTPs 5 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 AcroRd32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz AcroRd32.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString WINWORD.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily WINWORD.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU WINWORD.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FeatureControl\FEATURE_BROWSER_EMULATION AcroRd32.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-970747758-134341002-3585657277-1000_Classes\Local Settings OpenWith.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3824 WINWORD.EXE 3824 WINWORD.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 4760 e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe 4760 e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe 4120 powershell.exe 4120 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2948 OpenWith.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 4120 powershell.exe Token: SeBackupPrivilege 2076 vssvc.exe Token: SeRestorePrivilege 2076 vssvc.exe Token: SeAuditPrivilege 2076 vssvc.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2948 OpenWith.exe 2012 AcroRd32.exe 2012 AcroRd32.exe 2012 AcroRd32.exe 2012 AcroRd32.exe 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE 3824 WINWORD.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 4120 4760 e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe 82 PID 4760 wrote to memory of 4120 4760 e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe 82 PID 2948 wrote to memory of 2012 2948 OpenWith.exe 91 PID 2948 wrote to memory of 2012 2948 OpenWith.exe 91 PID 2948 wrote to memory of 2012 2948 OpenWith.exe 91 PID 2012 wrote to memory of 3812 2012 AcroRd32.exe 94 PID 2012 wrote to memory of 3812 2012 AcroRd32.exe 94 PID 2012 wrote to memory of 3812 2012 AcroRd32.exe 94 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 2620 3812 RdrCEF.exe 95 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 PID 3812 wrote to memory of 784 3812 RdrCEF.exe 96 -
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
Processes
-
C:\Users\Admin\AppData\Local\Temp\e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e2708d3c57b562b01da42f9e7549781f_JaffaCakes118.exe"1⤵
- Enumerates connected drives
- Sets desktop wallpaper using registry
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -e RwBlAHQALQBXAG0AaQBPAGIAagBlAGMAdAAgAFcAaQBuADMAMgBfAFMAaABhAGQAbwB3AGMAbwBwAHkAIAB8ACAARgBvAHIARQBhAGMAaAAtAE8AYgBqAGUAYwB0ACAAewAkAF8ALgBEAGUAbABlAHQAZQAoACkAOwB9AA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4120
-
-
C:\Windows\system32\wbem\unsecapp.exeC:\Windows\system32\wbem\unsecapp.exe -Embedding1⤵PID:2240
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:232
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroRd32.exe" "C:\Users\Admin\Documents\StepPing.doc.82iq912j"2⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Checks processor information in registry
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --backgroundcolor=165140433⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3812 -
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=renderer --disable-browser-side-navigation --disable-gpu-compositing --service-pipe-token=CFD4CCF2226F063364C984852228E8F0 --lang=en-US --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --enable-pinch --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --enable-gpu-async-worker-context --content-image-texture-target=0,0,3553;0,1,3553;0,2,3553;0,3,3553;0,4,3553;0,5,3553;0,6,3553;0,7,3553;0,8,3553;0,9,3553;0,10,3553;0,11,3553;0,12,3553;0,13,3553;0,14,3553;0,15,3553;0,16,3553;0,17,3553;0,18,3553;1,0,3553;1,1,3553;1,2,3553;1,3,3553;1,4,3553;1,5,3553;1,6,3553;1,7,3553;1,8,3553;1,9,3553;1,10,3553;1,11,3553;1,12,3553;1,13,3553;1,14,3553;1,15,3553;1,16,3553;1,17,3553;1,18,3553;2,0,3553;2,1,3553;2,2,3553;2,3,3553;2,4,3553;2,5,3553;2,6,3553;2,7,3553;2,8,3553;2,9,3553;2,10,3553;2,11,3553;2,12,3553;2,13,3553;2,14,3553;2,15,3553;2,16,3553;2,17,3553;2,18,3553;3,0,3553;3,1,3553;3,2,3553;3,3,3553;3,4,3553;3,5,3553;3,6,3553;3,7,3553;3,8,3553;3,9,3553;3,10,3553;3,11,3553;3,12,3553;3,13,3553;3,14,3553;3,15,3553;3,16,3553;3,17,3553;3,18,3553;4,0,3553;4,1,3553;4,2,3553;4,3,3553;4,4,3553;4,5,3553;4,6,3553;4,7,3553;4,8,3553;4,9,3553;4,10,3553;4,11,3553;4,12,3553;4,13,3553;4,14,3553;4,15,3553;4,16,3553;4,17,3553;4,18,3553;5,0,3553;5,1,3553;5,2,3553;5,3,3553;5,4,3553;5,5,3553;5,6,3553;5,7,3553;5,8,3553;5,9,3553;5,10,3553;5,11,3553;5,12,3553;5,13,3553;5,14,3553;5,15,3553;5,16,3553;5,17,3553;5,18,3553;6,0,3553;6,1,3553;6,2,3553;6,3,3553;6,4,3553;6,5,3553;6,6,3553;6,7,3553;6,8,3553;6,9,3553;6,10,3553;6,11,3553;6,12,3553;6,13,3553;6,14,3553;6,15,3553;6,16,3553;6,17,3553;6,18,3553 --disable-accelerated-video-decode --service-request-channel-token=CFD4CCF2226F063364C984852228E8F0 --renderer-client-id=2 --mojo-platform-channel-handle=1768 --allow-no-sandbox-job /prefetch:14⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe"C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\RdrCEF.exe" --type=gpu-process --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --gpu-preferences=GAAAAAAAAAAAB4AAAQAAAAAAAAAAAGAA --use-gl=swiftshader-webgl --gpu-vendor-id=0x1234 --gpu-device-id=0x1111 --gpu-driver-vendor="Google Inc." --gpu-driver-version=3.3.0.2 --gpu-driver-date=2017/04/07 --disable-pack-loading --lang=en-US --log-file="C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\debug.log" --log-severity=disable --product-version="ReaderServices/19.10.20064 Chrome/64.0.3282.119" --service-request-channel-token=4FCD6BCE4822214D57ECED2F0DF756C4 --mojo-platform-channel-handle=1776 --allow-no-sandbox-job --ignored=" --type=renderer " /prefetch:24⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
-
-
C:\Windows\System32\CompPkgSrv.exeC:\Windows\System32\CompPkgSrv.exe -Embedding1⤵PID:3128
-
C:\Windows\system32\NOTEPAD.EXE"C:\Windows\system32\NOTEPAD.EXE" C:\Users\Public\Desktop\82iq912j-readme.txt1⤵PID:3124
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\Documents\StepPing.doc" /o ""1⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3824
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6KB
MD578bcd40188b3f2e60e93729fa39e1c48
SHA152ec776bf3a56943becd0f62910094ecee56c54b
SHA25601d27333f399724364a0ab07b62ae55c80fa571a3375319923be510e1832db78
SHA5124044459fd1ea78c15f6d403a3d801def90f1def9313ef64b617e7040434fac182849a4bd8403c8c1f7d120a6e9f0159d91d71eb1d27402087a97be69b5cdcc91
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
297B
MD58c82574bf7a165bb658a3c55bc8a7507
SHA17a799afcea818d9e37b07f88630a2f43aee90d34
SHA2569dab31f52510b4ba7ae5e9fff64f2448ffae69f0eba46288d580dffed71490bc
SHA512e0a21e95aee133f7ae5a5e31166c1e66d2535388d687ec8b0ad030e66c3fcdbc78ae6c9728795cc6b898dd37b1fc281698aca277a23769ef892fa620ab9a190d
-
Filesize
482KB
MD5ad719d0af662079f39898bc989a58b7b
SHA1649a3f82dd904ebb39052ce03baa4f84bcb181f3
SHA2566917ce0cf2f1d3a6c8e25e1b67ca249f72b2f1eb5084e15dcc450a08db7cd716
SHA512be1c0867d0dbdee68802bde252a11dc67c3362f4d039767cf9118099d9ddbe8a0265e5a64966f73b76f5edef822ffa285a7586496d76acb98b912b19680c4c58