Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe
-
Size
66KB
-
MD5
eaab087e61c72fcc8fb3e76c98b86551
-
SHA1
ea24cd2cbc94f1d82459cd10a2afad834fded592
-
SHA256
7e30929e29367914be274db5519f2cdc03e4966b2f188c93b86fd33e68baf72f
-
SHA512
4aee66ec1192409f4e673ff1a14e6194dc11cdfd4dba8c18bcf119e227b4112a1ace0755f92a452964af001a44b3dc82841789863f1473b7531637ec95c72f58
-
SSDEEP
1536:wDYMKq7VxNFWrm7amfOMMkVsaTG/ne+koE/XAuOub5Oflc:oKq7VxfqGaSh8/nFE6fG
Malware Config
Signatures
-
Executes dropped EXE 37 IoCs
pid Process 1792 ctn.exe 2728 ctn.exe 2660 ctn.exe 2684 ctn.exe 2816 ctn.exe 2556 ctn.exe 2724 ctn.exe 2980 ctn.exe 768 ctn.exe 1840 ctn.exe 2776 ctn.exe 1652 ctn.exe 1220 ctn.exe 2036 ctn.exe 1164 ctn.exe 2708 ctn.exe 1484 ctn.exe 288 ctn.exe 2376 ctn.exe 968 ctn.exe 2448 ctn.exe 764 ctn.exe 2140 ctn.exe 568 ctn.exe 3068 ctn.exe 1692 ctn.exe 2304 ctn.exe 1736 ctn.exe 1712 ctn.exe 1436 ctn.exe 3044 ctn.exe 2756 ctn.exe 2664 ctn.exe 2540 ctn.exe 3004 ctn.exe 2644 ctn.exe 2604 ctn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe File created C:\Windows\SysWOW64\SysIdt.dll eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe -
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe -
Suspicious behavior: RenamesItself 37 IoCs
pid Process 2016 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 1792 ctn.exe 2728 ctn.exe 2660 ctn.exe 2684 ctn.exe 2816 ctn.exe 2556 ctn.exe 2724 ctn.exe 2980 ctn.exe 768 ctn.exe 1840 ctn.exe 2776 ctn.exe 1652 ctn.exe 1220 ctn.exe 2036 ctn.exe 1164 ctn.exe 2708 ctn.exe 1484 ctn.exe 288 ctn.exe 2376 ctn.exe 968 ctn.exe 2448 ctn.exe 764 ctn.exe 2140 ctn.exe 568 ctn.exe 3068 ctn.exe 1692 ctn.exe 2304 ctn.exe 1736 ctn.exe 1712 ctn.exe 1436 ctn.exe 3044 ctn.exe 2756 ctn.exe 2664 ctn.exe 2540 ctn.exe 3004 ctn.exe 2644 ctn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2016 wrote to memory of 1792 2016 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 31 PID 2016 wrote to memory of 1792 2016 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 31 PID 2016 wrote to memory of 1792 2016 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 31 PID 2016 wrote to memory of 1792 2016 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 31 PID 1792 wrote to memory of 2728 1792 ctn.exe 32 PID 1792 wrote to memory of 2728 1792 ctn.exe 32 PID 1792 wrote to memory of 2728 1792 ctn.exe 32 PID 1792 wrote to memory of 2728 1792 ctn.exe 32 PID 2728 wrote to memory of 2660 2728 ctn.exe 33 PID 2728 wrote to memory of 2660 2728 ctn.exe 33 PID 2728 wrote to memory of 2660 2728 ctn.exe 33 PID 2728 wrote to memory of 2660 2728 ctn.exe 33 PID 2660 wrote to memory of 2684 2660 ctn.exe 34 PID 2660 wrote to memory of 2684 2660 ctn.exe 34 PID 2660 wrote to memory of 2684 2660 ctn.exe 34 PID 2660 wrote to memory of 2684 2660 ctn.exe 34 PID 2684 wrote to memory of 2816 2684 ctn.exe 35 PID 2684 wrote to memory of 2816 2684 ctn.exe 35 PID 2684 wrote to memory of 2816 2684 ctn.exe 35 PID 2684 wrote to memory of 2816 2684 ctn.exe 35 PID 2816 wrote to memory of 2556 2816 ctn.exe 36 PID 2816 wrote to memory of 2556 2816 ctn.exe 36 PID 2816 wrote to memory of 2556 2816 ctn.exe 36 PID 2816 wrote to memory of 2556 2816 ctn.exe 36 PID 2556 wrote to memory of 2724 2556 ctn.exe 37 PID 2556 wrote to memory of 2724 2556 ctn.exe 37 PID 2556 wrote to memory of 2724 2556 ctn.exe 37 PID 2556 wrote to memory of 2724 2556 ctn.exe 37 PID 2724 wrote to memory of 2980 2724 ctn.exe 38 PID 2724 wrote to memory of 2980 2724 ctn.exe 38 PID 2724 wrote to memory of 2980 2724 ctn.exe 38 PID 2724 wrote to memory of 2980 2724 ctn.exe 38 PID 2980 wrote to memory of 768 2980 ctn.exe 39 PID 2980 wrote to memory of 768 2980 ctn.exe 39 PID 2980 wrote to memory of 768 2980 ctn.exe 39 PID 2980 wrote to memory of 768 2980 ctn.exe 39 PID 768 wrote to memory of 1840 768 ctn.exe 40 PID 768 wrote to memory of 1840 768 ctn.exe 40 PID 768 wrote to memory of 1840 768 ctn.exe 40 PID 768 wrote to memory of 1840 768 ctn.exe 40 PID 1840 wrote to memory of 2776 1840 ctn.exe 41 PID 1840 wrote to memory of 2776 1840 ctn.exe 41 PID 1840 wrote to memory of 2776 1840 ctn.exe 41 PID 1840 wrote to memory of 2776 1840 ctn.exe 41 PID 2776 wrote to memory of 1652 2776 ctn.exe 42 PID 2776 wrote to memory of 1652 2776 ctn.exe 42 PID 2776 wrote to memory of 1652 2776 ctn.exe 42 PID 2776 wrote to memory of 1652 2776 ctn.exe 42 PID 1652 wrote to memory of 1220 1652 ctn.exe 43 PID 1652 wrote to memory of 1220 1652 ctn.exe 43 PID 1652 wrote to memory of 1220 1652 ctn.exe 43 PID 1652 wrote to memory of 1220 1652 ctn.exe 43 PID 1220 wrote to memory of 2036 1220 ctn.exe 44 PID 1220 wrote to memory of 2036 1220 ctn.exe 44 PID 1220 wrote to memory of 2036 1220 ctn.exe 44 PID 1220 wrote to memory of 2036 1220 ctn.exe 44 PID 2036 wrote to memory of 1164 2036 ctn.exe 45 PID 2036 wrote to memory of 1164 2036 ctn.exe 45 PID 2036 wrote to memory of 1164 2036 ctn.exe 45 PID 2036 wrote to memory of 1164 2036 ctn.exe 45 PID 1164 wrote to memory of 2708 1164 ctn.exe 46 PID 1164 wrote to memory of 2708 1164 ctn.exe 46 PID 1164 wrote to memory of 2708 1164 ctn.exe 46 PID 1164 wrote to memory of 2708 1164 ctn.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Users\Admin\AppData\Local\Temp\eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2708 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1484 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:288 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2376 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:968 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2448 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:764 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2140 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:568 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3068 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1692 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2304 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1736 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1712 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1436 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3044 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2756 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2664 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2540 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:3004 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2644 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2604
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD546b1dc33d789af1bcd8f6fdd8be4e250
SHA110a2f09661ce9f0700b2ab39c9a093f9a139ff19
SHA2563c0a3c89bccff318faf01d68909f7e44fb9073d24ef99036f7a8fe906af01feb
SHA512fc9079ec272679280f9c6e0de318c1ab7ef43c348c3c31e21f4c7ecb6846cd3ca1cb33ed8331b3d24f07391015f08a880539f2eab4ca1e618d7571fe7150083a
-
Filesize
66KB
MD5eaab087e61c72fcc8fb3e76c98b86551
SHA1ea24cd2cbc94f1d82459cd10a2afad834fded592
SHA2567e30929e29367914be274db5519f2cdc03e4966b2f188c93b86fd33e68baf72f
SHA5124aee66ec1192409f4e673ff1a14e6194dc11cdfd4dba8c18bcf119e227b4112a1ace0755f92a452964af001a44b3dc82841789863f1473b7531637ec95c72f58