Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 03:52
Behavioral task
behavioral1
Sample
e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe
-
Size
713KB
-
MD5
e5fff3b2883a77ba676e822f50c876bc
-
SHA1
6d7d49f9d2a15c7b5dbe6f18890cb3db104da454
-
SHA256
5b20ac5ff7d0f91ab0e4670d93ed7c19e881cd936c6b461612cbdc3d1e80776c
-
SHA512
b1cc4b1335cc8e521e70ece7a03b7154f0c17887091b50689d0fcfa51485fc23328dcdc550d0d0d0d9d5503b8d3cf403c1fc1c996e720966fa900e6aad6bd1d4
-
SSDEEP
12288:LyR//TP9mlG+sw2xbqTOuQd47a1PuMgPzvxfzEzRq/3uPQ:LK/7glps9btumq8ulqzM/3uPQ
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 2552 msupdate.exe 1100 msupdate.exe 584 msupdate.exe 2916 msupdate.exe 1032 msupdate.exe 2812 msupdate.exe 3012 msupdate.exe 2924 msupdate.exe 1964 msupdate.exe 2848 msupdate.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe Key opened \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Wine msupdate.exe -
Loads dropped DLL 40 IoCs
pid Process 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 2552 msupdate.exe 2552 msupdate.exe 2552 msupdate.exe 2552 msupdate.exe 1100 msupdate.exe 1100 msupdate.exe 1100 msupdate.exe 1100 msupdate.exe 584 msupdate.exe 584 msupdate.exe 584 msupdate.exe 584 msupdate.exe 2916 msupdate.exe 2916 msupdate.exe 2916 msupdate.exe 2916 msupdate.exe 1032 msupdate.exe 1032 msupdate.exe 1032 msupdate.exe 1032 msupdate.exe 2812 msupdate.exe 2812 msupdate.exe 2812 msupdate.exe 2812 msupdate.exe 3012 msupdate.exe 3012 msupdate.exe 3012 msupdate.exe 3012 msupdate.exe 2924 msupdate.exe 2924 msupdate.exe 2924 msupdate.exe 2924 msupdate.exe 1964 msupdate.exe 1964 msupdate.exe 1964 msupdate.exe 1964 msupdate.exe 2848 msupdate.exe 2848 msupdate.exe 2848 msupdate.exe -
resource yara_rule behavioral1/memory/2116-0-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2116-17-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2116-18-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2116-130-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/files/0x0008000000016c56-131.dat themida behavioral1/memory/2552-143-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2552-144-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2552-145-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2552-147-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2552-148-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2552-149-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1100-155-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2552-157-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1100-273-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1100-274-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1100-284-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/584-400-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/584-404-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2916-410-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/584-413-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2916-530-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2916-533-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1032-539-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2916-540-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1032-656-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1032-659-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2812-665-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1032-669-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2812-785-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2812-787-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2812-796-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/3012-912-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/3012-914-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/3012-929-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2924-1038-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2924-1040-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2924-1129-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1964-1163-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/1964-1277-0x0000000000400000-0x0000000000678000-memory.dmp themida behavioral1/memory/2848-1278-0x0000000000400000-0x0000000000678000-memory.dmp themida -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe msupdate.exe File created C:\Windows\SysWOW64\msupdate.exe e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe File opened for modification C:\Windows\SysWOW64\msupdate.exe msupdate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 11 IoCs
pid Process 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 2552 msupdate.exe 1100 msupdate.exe 584 msupdate.exe 2916 msupdate.exe 1032 msupdate.exe 2812 msupdate.exe 3012 msupdate.exe 2924 msupdate.exe 1964 msupdate.exe 2848 msupdate.exe -
System Location Discovery: System Language Discovery 1 TTPs 31 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msupdate.exe -
Runs .reg file with regedit 10 IoCs
pid Process 2792 regedit.exe 2120 regedit.exe 1016 regedit.exe 2136 regedit.exe 1420 regedit.exe 1328 regedit.exe 2988 regedit.exe 1396 regedit.exe 2332 regedit.exe 2752 regedit.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 2552 msupdate.exe 1100 msupdate.exe 584 msupdate.exe 2916 msupdate.exe 1032 msupdate.exe 2812 msupdate.exe 3012 msupdate.exe 2924 msupdate.exe 1964 msupdate.exe 2848 msupdate.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2292 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2292 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2292 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 30 PID 2116 wrote to memory of 2292 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 30 PID 2292 wrote to memory of 1420 2292 cmd.exe 31 PID 2292 wrote to memory of 1420 2292 cmd.exe 31 PID 2292 wrote to memory of 1420 2292 cmd.exe 31 PID 2292 wrote to memory of 1420 2292 cmd.exe 31 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2116 wrote to memory of 2552 2116 e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe 32 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 2552 wrote to memory of 1100 2552 msupdate.exe 34 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 1100 wrote to memory of 304 1100 msupdate.exe 35 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 304 wrote to memory of 2792 304 cmd.exe 36 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 1100 wrote to memory of 584 1100 msupdate.exe 37 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 584 wrote to memory of 2628 584 msupdate.exe 38 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 2628 wrote to memory of 2120 2628 cmd.exe 39 PID 584 wrote to memory of 2916 584 msupdate.exe 40 PID 584 wrote to memory of 2916 584 msupdate.exe 40 PID 584 wrote to memory of 2916 584 msupdate.exe 40 PID 584 wrote to memory of 2916 584 msupdate.exe 40 PID 584 wrote to memory of 2916 584 msupdate.exe 40 PID 584 wrote to memory of 2916 584 msupdate.exe 40 PID 584 wrote to memory of 2916 584 msupdate.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe"1⤵
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1420
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 652 "C:\Users\Admin\AppData\Local\Temp\e5fff3b2883a77ba676e822f50c876bc_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 776 "C:\Windows\SysWOW64\msupdate.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2792
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 780 "C:\Windows\SysWOW64\msupdate.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2120
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 788 "C:\Windows\SysWOW64\msupdate.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2752
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 784 "C:\Windows\SysWOW64\msupdate.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1016
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 800 "C:\Windows\SysWOW64\msupdate.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2812 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵
- System Location Discovery: System Language Discovery
PID:1780 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1328
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 804 "C:\Windows\SysWOW64\msupdate.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2988
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 796 "C:\Windows\SysWOW64\msupdate.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2924 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2136
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 792 "C:\Windows\SysWOW64\msupdate.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:896 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1396
-
-
-
C:\Windows\SysWOW64\msupdate.exeC:\Windows\system32\msupdate.exe 816 "C:\Windows\SysWOW64\msupdate.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2848 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2332
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
3KB
MD5d085cde42c14e8ee2a5e8870d08aee42
SHA1c8e967f1d301f97dbcf252d7e1677e590126f994
SHA256a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f
SHA512de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b
-
Filesize
3KB
MD5c8441ec8a2edf9b2f4f631fe930ea4d9
SHA12855ee21116b427d280fcaa2471c9bd3d2957f6f
SHA256dd2fa55643d4e02b39ef5a619f2ca63e49d6cc1e6513d953c2d9400d46b88184
SHA512b0b03828275f895adf93ef6b9d40d31e10f166d40c1ee0f5697aadcee1b6d5e8b81637ccfcf66ba9dfd92295f106cfac0eca2320b71a15ad96fdbe06f6764ef7
-
Filesize
849B
MD5558ce6da965ba1758d112b22e15aa5a2
SHA1a365542609e4d1dc46be62928b08612fcabe2ede
SHA256c11beaac10a5e00391ef4b41be8c240f59c5a2dc930aead6d7db237fcd2641fb
SHA51237f7f10c3d201b11cc5224ae69c5990eb33b4430c601d3c21f6bec9323621120442e0cfa49e1f4eda459ea4ac750277e446dca78b9e44c1445bd891e4e460b5c
-
Filesize
10B
MD5c756b8eac93de58d57105a6c35adb50f
SHA1b18d370dabc3c5b9e82d74f19bbc101a1be009f2
SHA256853448e59c9bb7599fa8a5ff03a0b608781a02d41f58576f1192e0c48cb8d635
SHA51209fbfe4a17b1fb6167c6889e5a0ab41cfef9e1372796e69c2558a50a002d9c1e2b0d81d45d7f96be9d02a8025d0ae276ecc01f135e9ccb04c301adcffd67d263
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
713KB
MD5e5fff3b2883a77ba676e822f50c876bc
SHA16d7d49f9d2a15c7b5dbe6f18890cb3db104da454
SHA2565b20ac5ff7d0f91ab0e4670d93ed7c19e881cd936c6b461612cbdc3d1e80776c
SHA512b1cc4b1335cc8e521e70ece7a03b7154f0c17887091b50689d0fcfa51485fc23328dcdc550d0d0d0d9d5503b8d3cf403c1fc1c996e720966fa900e6aad6bd1d4