Analysis
-
max time kernel
149s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
17-09-2024 12:38
Static task
static1
Behavioral task
behavioral1
Sample
e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
e6d6866e90902a708fc0cfea69bd028a
-
SHA1
47c26e495eefb975f5145c4fe3899588b98c0d63
-
SHA256
2dcab2ea2abcc183d351c27be4b0c01860ab6a4250c84f76132f348548117766
-
SHA512
5a2b15cdc979ab16805ef4d143ec8c60416043649c2815adeb1031e62db65233b4c811c1a169138cb27c1cdf8e3e26852c54707af9766931748f481b5ec89632
-
SSDEEP
24576:pxdC6cVrb8romUZJgWfqedOoqdIjXxQRkF1mpaq8xltMK0MuDwrefAXnYW9iyW:pDC6cb8Cdhq6jXrZxlW0reoXn
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 12 IoCs
pid Process 2776 Winampcrk.exe 1624 MYBOT.exe 1136 windows_update.exe 2184 windows_update.exe 2452 windows_update.exe 1220 windows_update.exe 2388 windows_update.exe 2564 windows_update.exe 2484 windows_update.exe 2908 windows_update.exe 2064 windows_update.exe 2292 windows_update.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine MYBOT.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Wine windows_update.exe -
Loads dropped DLL 44 IoCs
pid Process 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 1624 MYBOT.exe 1136 windows_update.exe 1136 windows_update.exe 1136 windows_update.exe 1136 windows_update.exe 2184 windows_update.exe 2184 windows_update.exe 2184 windows_update.exe 2184 windows_update.exe 2452 windows_update.exe 2452 windows_update.exe 2452 windows_update.exe 2452 windows_update.exe 1220 windows_update.exe 1220 windows_update.exe 1220 windows_update.exe 1220 windows_update.exe 2388 windows_update.exe 2388 windows_update.exe 2388 windows_update.exe 2388 windows_update.exe 2564 windows_update.exe 2564 windows_update.exe 2564 windows_update.exe 2564 windows_update.exe 2484 windows_update.exe 2484 windows_update.exe 2484 windows_update.exe 2484 windows_update.exe 2908 windows_update.exe 2908 windows_update.exe 2908 windows_update.exe 2908 windows_update.exe 2064 windows_update.exe 2064 windows_update.exe 2064 windows_update.exe 2064 windows_update.exe 2292 windows_update.exe 2292 windows_update.exe 2292 windows_update.exe -
resource yara_rule behavioral1/files/0x00070000000193f7-12.dat themida behavioral1/memory/2532-21-0x0000000002F40000-0x00000000032EF000-memory.dmp themida behavioral1/memory/1624-23-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1624-145-0x0000000005200000-0x00000000055AF000-memory.dmp themida behavioral1/memory/1624-157-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1136-158-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1136-160-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2184-169-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1136-171-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2184-289-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2184-290-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2452-296-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2184-307-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2452-416-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2452-419-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1220-425-0x0000000000CB0000-0x000000000105F000-memory.dmp themida behavioral1/memory/1220-427-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2452-428-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1220-546-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1220-547-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2388-554-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/1220-670-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2388-672-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2388-673-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2388-794-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2564-795-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2564-916-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2484-917-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2484-923-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2908-1039-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2908-1153-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2064-1154-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2064-1268-0x0000000000400000-0x00000000007AF000-memory.dmp themida behavioral1/memory/2292-1269-0x0000000000400000-0x00000000007AF000-memory.dmp themida -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe MYBOT.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe MYBOT.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Winampcrk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MYBOT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 10 IoCs
pid Process 1792 regedit.exe 2152 regedit.exe 1436 regedit.exe 3044 regedit.exe 820 regedit.exe 2800 regedit.exe 868 regedit.exe 3040 regedit.exe 2980 regedit.exe 2588 regedit.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 1624 MYBOT.exe 1136 windows_update.exe 2184 windows_update.exe 2452 windows_update.exe 1220 windows_update.exe 2388 windows_update.exe 2564 windows_update.exe 2484 windows_update.exe 2908 windows_update.exe 2064 windows_update.exe 2292 windows_update.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: 33 2840 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2840 AUDIODG.EXE Token: 33 2840 AUDIODG.EXE Token: SeIncBasePriorityPrivilege 2840 AUDIODG.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2532 wrote to memory of 2776 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2776 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2776 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 29 PID 2532 wrote to memory of 2776 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 29 PID 2532 wrote to memory of 1624 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1624 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1624 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 30 PID 2532 wrote to memory of 1624 2532 e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe 30 PID 1624 wrote to memory of 2700 1624 MYBOT.exe 32 PID 1624 wrote to memory of 2700 1624 MYBOT.exe 32 PID 1624 wrote to memory of 2700 1624 MYBOT.exe 32 PID 1624 wrote to memory of 2700 1624 MYBOT.exe 32 PID 2700 wrote to memory of 868 2700 cmd.exe 33 PID 2700 wrote to memory of 868 2700 cmd.exe 33 PID 2700 wrote to memory of 868 2700 cmd.exe 33 PID 2700 wrote to memory of 868 2700 cmd.exe 33 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1624 wrote to memory of 1136 1624 MYBOT.exe 34 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 1136 wrote to memory of 2184 1136 windows_update.exe 35 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 2184 wrote to memory of 3000 2184 windows_update.exe 36 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 3000 wrote to memory of 1792 3000 cmd.exe 37 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2184 wrote to memory of 2452 2184 windows_update.exe 38 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 2452 wrote to memory of 396 2452 windows_update.exe 39 PID 396 wrote to memory of 2152 396 cmd.exe 40 PID 396 wrote to memory of 2152 396 cmd.exe 40 PID 396 wrote to memory of 2152 396 cmd.exe 40 PID 396 wrote to memory of 2152 396 cmd.exe 40 PID 396 wrote to memory of 2152 396 cmd.exe 40 PID 396 wrote to memory of 2152 396 cmd.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e6d6866e90902a708fc0cfea69bd028a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Winampcrk.exe"C:\Users\Admin\AppData\Local\Temp\Winampcrk.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2776
-
-
C:\Users\Admin\AppData\Local\Temp\MYBOT.exe"C:\Users\Admin\AppData\Local\Temp\MYBOT.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:868
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 620 "C:\Users\Admin\AppData\Local\Temp\MYBOT.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 760 "C:\Windows\SysWOW64\windows_update.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1792
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 768 "C:\Windows\SysWOW64\windows_update.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2152
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 780 "C:\Windows\SysWOW64\windows_update.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1436
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 772 "C:\Windows\SysWOW64\windows_update.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3044
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 784 "C:\Windows\SysWOW64\windows_update.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:2784 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2588
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 792 "C:\Windows\SysWOW64\windows_update.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3040
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 788 "C:\Windows\SysWOW64\windows_update.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:820
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 800 "C:\Windows\SysWOW64\windows_update.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2800
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 804 "C:\Windows\SysWOW64\windows_update.exe"12⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat13⤵
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg14⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\system32\AUDIODG.EXEC:\Windows\system32\AUDIODG.EXE 0x5e41⤵
- Suspicious use of AdjustPrivilegeToken
PID:2840
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
784B
MD55a466127fedf6dbcd99adc917bd74581
SHA1a2e60b101c8789b59360d95a64ec07d0723c4d38
SHA2568cd3b8dd28ac014cf973d9ab4b03af1c274bbc9b5ee0ee4ab8af0bdb01573b84
SHA512695cafc932bc8f0a514bc515860cb275297665de63ca3394b55f42c457761ebf654d29d504674681a77b34e3356a469e8c5b97ff7efc24de330d5375f025cba5
-
Filesize
1KB
MD582fb85e6f9058c36d57abc2350ffee7e
SHA1f52708d066380d42924513f697ab4ed5492f78b8
SHA2560696a5c075674c13128a61fd02c3be39c68860dc24f3669415817d03c75415c6
SHA51227c84e21ed39cc0ff6377d717b99ee444867eba7a74b878b30c8a7ec7df97003f02963399020abe09a73f4b6949c75580eb85067412f4ccdacc03e8caf5d966a
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
1.4MB
MD50c3c6747aa1f75ea0b35a76576004f6f
SHA1a96d1617c4586932f9790cf6886dd14cf4541957
SHA25684f4c834069cb14cfe11ec85442386d4c021c51a32ea42ac747420ac5e8d849f
SHA512c00d303d0e83f4f5ad11805bdf66ac363b0561d7948aee16654fca93331e5757e22f653a86830732a32c49d3e8e6f4dcd3fafcd208481fc6e5cf5030239b40b9
-
Filesize
122KB
MD52765fd619cf31e100c3f28b84b85ba35
SHA15a6e10edc9b6112964efd2fb45dc05b0f0916269
SHA2566a5027a29992d11566d23ef3ace79d18fa2e0fe1f67a619ab79c4c10f62c7af8
SHA512425d8b7ec804b316c26c677e04797fcc03a19183b7025a8a9df653fb437e1327bb7fd1cb7ee26caf54f5848de2c39b1e92b4bcf51bd958b7557543fb873704dc