Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 05:26
Static task
static1
Behavioral task
behavioral1
Sample
eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe
-
Size
66KB
-
MD5
eaab087e61c72fcc8fb3e76c98b86551
-
SHA1
ea24cd2cbc94f1d82459cd10a2afad834fded592
-
SHA256
7e30929e29367914be274db5519f2cdc03e4966b2f188c93b86fd33e68baf72f
-
SHA512
4aee66ec1192409f4e673ff1a14e6194dc11cdfd4dba8c18bcf119e227b4112a1ace0755f92a452964af001a44b3dc82841789863f1473b7531637ec95c72f58
-
SSDEEP
1536:wDYMKq7VxNFWrm7amfOMMkVsaTG/ne+koE/XAuOub5Oflc:oKq7VxfqGaSh8/nFE6fG
Malware Config
Signatures
-
Executes dropped EXE 37 IoCs
pid Process 5012 ctn.exe 3280 ctn.exe 3488 ctn.exe 4084 ctn.exe 4028 ctn.exe 4308 ctn.exe 3048 ctn.exe 5036 ctn.exe 5048 ctn.exe 628 ctn.exe 1032 ctn.exe 940 ctn.exe 4024 ctn.exe 2456 ctn.exe 3628 ctn.exe 4056 ctn.exe 2960 ctn.exe 1784 ctn.exe 2616 ctn.exe 656 ctn.exe 3500 ctn.exe 2068 ctn.exe 4584 ctn.exe 2908 ctn.exe 2432 ctn.exe 4760 ctn.exe 4484 ctn.exe 2352 ctn.exe 2208 ctn.exe 2220 ctn.exe 2988 ctn.exe 2216 ctn.exe 672 ctn.exe 1284 ctn.exe 212 ctn.exe 2112 ctn.exe 1988 ctn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File created C:\Windows\SysWOW64\SysIdt.dll eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\SysIdt.dll ctn.exe File opened for modification C:\Windows\SysWOW64\ctn.exe ctn.exe -
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctn.exe -
Suspicious behavior: RenamesItself 37 IoCs
pid Process 1668 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 5012 ctn.exe 3280 ctn.exe 3488 ctn.exe 4084 ctn.exe 4028 ctn.exe 4308 ctn.exe 3048 ctn.exe 5036 ctn.exe 5048 ctn.exe 628 ctn.exe 1032 ctn.exe 940 ctn.exe 4024 ctn.exe 2456 ctn.exe 3628 ctn.exe 4056 ctn.exe 2960 ctn.exe 1784 ctn.exe 2616 ctn.exe 656 ctn.exe 3500 ctn.exe 2068 ctn.exe 4584 ctn.exe 2908 ctn.exe 2432 ctn.exe 4760 ctn.exe 4484 ctn.exe 2352 ctn.exe 2208 ctn.exe 2220 ctn.exe 2988 ctn.exe 2216 ctn.exe 672 ctn.exe 1284 ctn.exe 212 ctn.exe 2112 ctn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 5012 1668 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 89 PID 1668 wrote to memory of 5012 1668 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 89 PID 1668 wrote to memory of 5012 1668 eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe 89 PID 5012 wrote to memory of 3280 5012 ctn.exe 91 PID 5012 wrote to memory of 3280 5012 ctn.exe 91 PID 5012 wrote to memory of 3280 5012 ctn.exe 91 PID 3280 wrote to memory of 3488 3280 ctn.exe 94 PID 3280 wrote to memory of 3488 3280 ctn.exe 94 PID 3280 wrote to memory of 3488 3280 ctn.exe 94 PID 3488 wrote to memory of 4084 3488 ctn.exe 95 PID 3488 wrote to memory of 4084 3488 ctn.exe 95 PID 3488 wrote to memory of 4084 3488 ctn.exe 95 PID 4084 wrote to memory of 4028 4084 ctn.exe 96 PID 4084 wrote to memory of 4028 4084 ctn.exe 96 PID 4084 wrote to memory of 4028 4084 ctn.exe 96 PID 4028 wrote to memory of 4308 4028 ctn.exe 97 PID 4028 wrote to memory of 4308 4028 ctn.exe 97 PID 4028 wrote to memory of 4308 4028 ctn.exe 97 PID 4308 wrote to memory of 3048 4308 ctn.exe 98 PID 4308 wrote to memory of 3048 4308 ctn.exe 98 PID 4308 wrote to memory of 3048 4308 ctn.exe 98 PID 3048 wrote to memory of 5036 3048 ctn.exe 100 PID 3048 wrote to memory of 5036 3048 ctn.exe 100 PID 3048 wrote to memory of 5036 3048 ctn.exe 100 PID 5036 wrote to memory of 5048 5036 ctn.exe 102 PID 5036 wrote to memory of 5048 5036 ctn.exe 102 PID 5036 wrote to memory of 5048 5036 ctn.exe 102 PID 5048 wrote to memory of 628 5048 ctn.exe 103 PID 5048 wrote to memory of 628 5048 ctn.exe 103 PID 5048 wrote to memory of 628 5048 ctn.exe 103 PID 628 wrote to memory of 1032 628 ctn.exe 104 PID 628 wrote to memory of 1032 628 ctn.exe 104 PID 628 wrote to memory of 1032 628 ctn.exe 104 PID 1032 wrote to memory of 940 1032 ctn.exe 105 PID 1032 wrote to memory of 940 1032 ctn.exe 105 PID 1032 wrote to memory of 940 1032 ctn.exe 105 PID 940 wrote to memory of 4024 940 ctn.exe 106 PID 940 wrote to memory of 4024 940 ctn.exe 106 PID 940 wrote to memory of 4024 940 ctn.exe 106 PID 4024 wrote to memory of 2456 4024 ctn.exe 107 PID 4024 wrote to memory of 2456 4024 ctn.exe 107 PID 4024 wrote to memory of 2456 4024 ctn.exe 107 PID 2456 wrote to memory of 3628 2456 ctn.exe 108 PID 2456 wrote to memory of 3628 2456 ctn.exe 108 PID 2456 wrote to memory of 3628 2456 ctn.exe 108 PID 3628 wrote to memory of 4056 3628 ctn.exe 109 PID 3628 wrote to memory of 4056 3628 ctn.exe 109 PID 3628 wrote to memory of 4056 3628 ctn.exe 109 PID 4056 wrote to memory of 2960 4056 ctn.exe 110 PID 4056 wrote to memory of 2960 4056 ctn.exe 110 PID 4056 wrote to memory of 2960 4056 ctn.exe 110 PID 2960 wrote to memory of 1784 2960 ctn.exe 111 PID 2960 wrote to memory of 1784 2960 ctn.exe 111 PID 2960 wrote to memory of 1784 2960 ctn.exe 111 PID 1784 wrote to memory of 2616 1784 ctn.exe 112 PID 1784 wrote to memory of 2616 1784 ctn.exe 112 PID 1784 wrote to memory of 2616 1784 ctn.exe 112 PID 2616 wrote to memory of 656 2616 ctn.exe 113 PID 2616 wrote to memory of 656 2616 ctn.exe 113 PID 2616 wrote to memory of 656 2616 ctn.exe 113 PID 656 wrote to memory of 3500 656 ctn.exe 114 PID 656 wrote to memory of 3500 656 ctn.exe 114 PID 656 wrote to memory of 3500 656 ctn.exe 114 PID 3500 wrote to memory of 2068 3500 ctn.exe 115
Processes
-
C:\Users\Admin\AppData\Local\Temp\eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Users\Admin\AppData\Local\Temp\eaab087e61c72fcc8fb3e76c98b86551_JaffaCakes118.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3280 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5036 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:940 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4024 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4056 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2068 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4584 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2908 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2432 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4760 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:4484 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2352 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2208 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2220 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2988 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2216 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:672 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:1284 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:212 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
PID:2112 -
C:\Windows\SysWOW64\ctn.exe"C:\Windows\system32\ctn.exe" C:\Windows\SysWOW64\ctn.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1988
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD546b1dc33d789af1bcd8f6fdd8be4e250
SHA110a2f09661ce9f0700b2ab39c9a093f9a139ff19
SHA2563c0a3c89bccff318faf01d68909f7e44fb9073d24ef99036f7a8fe906af01feb
SHA512fc9079ec272679280f9c6e0de318c1ab7ef43c348c3c31e21f4c7ecb6846cd3ca1cb33ed8331b3d24f07391015f08a880539f2eab4ca1e618d7571fe7150083a
-
Filesize
66KB
MD5eaab087e61c72fcc8fb3e76c98b86551
SHA1ea24cd2cbc94f1d82459cd10a2afad834fded592
SHA2567e30929e29367914be274db5519f2cdc03e4966b2f188c93b86fd33e68baf72f
SHA5124aee66ec1192409f4e673ff1a14e6194dc11cdfd4dba8c18bcf119e227b4112a1ace0755f92a452964af001a44b3dc82841789863f1473b7531637ec95c72f58