Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-09-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe
Resource
win10v2004-20240910-en
General
-
Target
ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe
-
Size
239KB
-
MD5
ea1948163146fb253f7c28a1afe77f7b
-
SHA1
19c07b297aa70d25de8bc83cfd80603f7abb3f58
-
SHA256
b2ca8ddbae694c93eef254de36e749cd506d4d50962c284ee1ec7bf59492fd30
-
SHA512
6e15a2120695831e024ad45cf72a85283b137a445d76ba9e6e7c45606af2f79931864cee481ff398bfa10bd2951c41d09618c842ccf51ececfa36179f8525364
-
SSDEEP
6144:txCppZZ8PySTftmck9eCUaAAmlgGgUE42:txCb/af0cpCU9ArGgUO
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" svhost.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe -
Executes dropped EXE 20 IoCs
pid Process 2872 svhost.exe 2768 svhost.exe 1388 svhost.exe 2776 svhost.exe 1408 svhost.exe 2196 svhost.exe 1284 svhost.exe 2468 svhost.exe 1912 svhost.exe 900 svhost.exe 2164 svhost.exe 2704 svhost.exe 2004 svhost.exe 2660 svhost.exe 1492 svhost.exe 584 svhost.exe 1816 svhost.exe 2076 svhost.exe 2780 svhost.exe 1420 svhost.exe -
Loads dropped DLL 21 IoCs
pid Process 1716 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 1716 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 2872 svhost.exe 2768 svhost.exe 2768 svhost.exe 2776 svhost.exe 2776 svhost.exe 2196 svhost.exe 2196 svhost.exe 2468 svhost.exe 2468 svhost.exe 900 svhost.exe 900 svhost.exe 2704 svhost.exe 2704 svhost.exe 2660 svhost.exe 2660 svhost.exe 584 svhost.exe 584 svhost.exe 2076 svhost.exe 2076 svhost.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File created C:\Windows\SysWOW64\svhost.exe svhost.exe File opened for modification C:\Windows\SysWOW64\svhost.exe ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe -
Suspicious use of SetThreadContext 11 IoCs
description pid Process procid_target PID 2540 set thread context of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2872 set thread context of 2768 2872 svhost.exe 44 PID 1388 set thread context of 2776 1388 svhost.exe 50 PID 1408 set thread context of 2196 1408 svhost.exe 61 PID 1284 set thread context of 2468 1284 svhost.exe 69 PID 1912 set thread context of 900 1912 svhost.exe 76 PID 2164 set thread context of 2704 2164 svhost.exe 85 PID 2004 set thread context of 2660 2004 svhost.exe 93 PID 1492 set thread context of 584 1492 svhost.exe 100 PID 1816 set thread context of 2076 1816 svhost.exe 108 PID 2780 set thread context of 1420 2780 svhost.exe 116 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe -
Runs net.exe
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2428 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2428 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2428 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2428 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 30 PID 2540 wrote to memory of 1928 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1928 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1928 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1928 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 31 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 2540 wrote to memory of 1716 2540 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 34 PID 1928 wrote to memory of 2824 1928 net.exe 35 PID 1928 wrote to memory of 2824 1928 net.exe 35 PID 1928 wrote to memory of 2824 1928 net.exe 35 PID 1928 wrote to memory of 2824 1928 net.exe 35 PID 1716 wrote to memory of 2872 1716 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2872 1716 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2872 1716 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 36 PID 1716 wrote to memory of 2872 1716 ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe 36 PID 2428 wrote to memory of 1340 2428 net.exe 37 PID 2428 wrote to memory of 1340 2428 net.exe 37 PID 2428 wrote to memory of 1340 2428 net.exe 37 PID 2428 wrote to memory of 1340 2428 net.exe 37 PID 2872 wrote to memory of 2852 2872 svhost.exe 38 PID 2872 wrote to memory of 2852 2872 svhost.exe 38 PID 2872 wrote to memory of 2852 2872 svhost.exe 38 PID 2872 wrote to memory of 2852 2872 svhost.exe 38 PID 2872 wrote to memory of 2952 2872 svhost.exe 40 PID 2872 wrote to memory of 2952 2872 svhost.exe 40 PID 2872 wrote to memory of 2952 2872 svhost.exe 40 PID 2872 wrote to memory of 2952 2872 svhost.exe 40 PID 2852 wrote to memory of 2936 2852 net.exe 41 PID 2852 wrote to memory of 2936 2852 net.exe 41 PID 2852 wrote to memory of 2936 2852 net.exe 41 PID 2852 wrote to memory of 2936 2852 net.exe 41 PID 2952 wrote to memory of 2772 2952 net.exe 43 PID 2952 wrote to memory of 2772 2952 net.exe 43 PID 2952 wrote to memory of 2772 2952 net.exe 43 PID 2952 wrote to memory of 2772 2952 net.exe 43 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2872 wrote to memory of 2768 2872 svhost.exe 44 PID 2768 wrote to memory of 1388 2768 svhost.exe 45 PID 2768 wrote to memory of 1388 2768 svhost.exe 45 PID 2768 wrote to memory of 1388 2768 svhost.exe 45 PID 2768 wrote to memory of 1388 2768 svhost.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"1⤵
- Modifies security service
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc3⤵PID:1340
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess3⤵
- System Location Discovery: System Language Discovery
PID:2824
-
-
-
C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 444 "C:\Users\Admin\AppData\Local\Temp\ea1948163146fb253f7c28a1afe77f7b_JaffaCakes118.exe"3⤵
- Modifies security service
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc5⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess5⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"5⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc6⤵
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc7⤵
- System Location Discovery: System Language Discovery
PID:2184
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess6⤵
- System Location Discovery: System Language Discovery
PID:2152 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess7⤵
- System Location Discovery: System Language Discovery
PID:1996
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"7⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1408 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc8⤵
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc9⤵
- System Location Discovery: System Language Discovery
PID:980
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess8⤵
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess9⤵
- System Location Discovery: System Language Discovery
PID:1188
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"9⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1284 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc10⤵
- System Location Discovery: System Language Discovery
PID:784 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc11⤵
- System Location Discovery: System Language Discovery
PID:1732
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess10⤵
- System Location Discovery: System Language Discovery
PID:1008 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess11⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"11⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1912 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc12⤵
- System Location Discovery: System Language Discovery
PID:1420 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc13⤵
- System Location Discovery: System Language Discovery
PID:1776
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess12⤵
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess13⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:900 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"13⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc14⤵
- System Location Discovery: System Language Discovery
PID:2256 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc15⤵
- System Location Discovery: System Language Discovery
PID:2880
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess14⤵PID:2736
-
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess15⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"15⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2004 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc16⤵
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc17⤵
- System Location Discovery: System Language Discovery
PID:1740
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess16⤵
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess17⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"17⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1492 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc18⤵
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc19⤵
- System Location Discovery: System Language Discovery
PID:2012
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess18⤵
- System Location Discovery: System Language Discovery
PID:1884 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess19⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:584 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"19⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1816 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc20⤵
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc21⤵
- System Location Discovery: System Language Discovery
PID:680
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess20⤵
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess21⤵
- System Location Discovery: System Language Discovery
PID:744
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\svhost.exeC:\Windows\system32\svhost.exe 516 "C:\Windows\SysWOW64\svhost.exe"21⤵
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop wscsvc22⤵
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop wscsvc23⤵
- System Location Discovery: System Language Discovery
PID:1180
-
-
-
C:\Windows\SysWOW64\net.exe"C:\Windows\System32\net.exe" stop SharedAccess22⤵
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop SharedAccess23⤵
- System Location Discovery: System Language Discovery
PID:1780
-
-
-
C:\Windows\SysWOW64\svhost.exe"C:\Windows\SysWOW64\svhost.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1420
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
239KB
MD5ea1948163146fb253f7c28a1afe77f7b
SHA119c07b297aa70d25de8bc83cfd80603f7abb3f58
SHA256b2ca8ddbae694c93eef254de36e749cd506d4d50962c284ee1ec7bf59492fd30
SHA5126e15a2120695831e024ad45cf72a85283b137a445d76ba9e6e7c45606af2f79931864cee481ff398bfa10bd2951c41d09618c842ccf51ececfa36179f8525364