Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19-09-2024 06:45
Static task
static1
Behavioral task
behavioral1
Sample
eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe
-
Size
2.9MB
-
MD5
eac90624b777b28d1049dbb907d15a5f
-
SHA1
1edfec839bd5dade13e637e37a4d9e434dcc6d62
-
SHA256
4219e3fde43f1a64d937cf29a91cd2894986aea3dcaee98ec4fb2de9fabfd4e6
-
SHA512
a04b731c7c23b794f3a2f4ed72dde9243c642548e6a82662833cfb7bcb9e5b208628babf1a7fba9448fb30fa67dde6a2393ebd6284858bd4f053ca9b44baa1cb
-
SSDEEP
49152:tOenanS7qj2OfqfI6p6shtvT0JehzIybYdCPVvrYtCSV5dtKwjqUo6NXLlRR:2njj2OyAxsDLM8dDm5dPjjlRR
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe,C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe -
Checks BIOS information in registry 2 TTPs 10 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation winupdate.exe Key value queried \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Control Panel\International\Geo\Nation winupdate.exe -
Executes dropped EXE 3 IoCs
pid Process 2888 winupdate.exe 4488 winupdate.exe 2044 winupdate.exe -
Identifies Wine through registry keys 2 TTPs 5 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine winupdate.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine explorer.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine winupdate.exe Key opened \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\Software\Wine winupdate.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-786284298-625481688-3210388970-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winupdater = "C:\\Windows\\system32\\Windupdt\\winupdate.exe" winupdate.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winupdate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winupdate.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA winupdate.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 5 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 winupdate.exe File opened for modification \??\PhysicalDrive0 explorer.exe File opened for modification \??\PhysicalDrive0 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 winupdate.exe File opened for modification \??\PhysicalDrive0 winupdate.exe -
Drops file in System32 directory 12 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Windupdt\ eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe File created C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\ winupdate.exe File opened for modification C:\Windows\SysWOW64\Windupdt\winupdate.exe winupdate.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 5 IoCs
pid Process 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 2888 winupdate.exe 4488 winupdate.exe 2044 winupdate.exe 60 explorer.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 60 2044 winupdate.exe 95 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winupdate.exe -
Checks processor information in registry 2 TTPs 20 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winupdate.exe -
Enumerates system info in registry 2 TTPs 5 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier winupdate.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupdate.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winupdate.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 2888 winupdate.exe 2888 winupdate.exe 4488 winupdate.exe 4488 winupdate.exe 2044 winupdate.exe 2044 winupdate.exe 60 explorer.exe 60 explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 60 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeSecurityPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeLoadDriverPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeSystemProfilePrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeSystemtimePrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeBackupPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeRestorePrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeShutdownPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeDebugPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeUndockPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeManageVolumePrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeImpersonatePrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: 33 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: 34 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: 35 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: 36 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2888 winupdate.exe Token: SeSecurityPrivilege 2888 winupdate.exe Token: SeTakeOwnershipPrivilege 2888 winupdate.exe Token: SeLoadDriverPrivilege 2888 winupdate.exe Token: SeSystemProfilePrivilege 2888 winupdate.exe Token: SeSystemtimePrivilege 2888 winupdate.exe Token: SeProfSingleProcessPrivilege 2888 winupdate.exe Token: SeIncBasePriorityPrivilege 2888 winupdate.exe Token: SeCreatePagefilePrivilege 2888 winupdate.exe Token: SeBackupPrivilege 2888 winupdate.exe Token: SeRestorePrivilege 2888 winupdate.exe Token: SeShutdownPrivilege 2888 winupdate.exe Token: SeDebugPrivilege 2888 winupdate.exe Token: SeSystemEnvironmentPrivilege 2888 winupdate.exe Token: SeChangeNotifyPrivilege 2888 winupdate.exe Token: SeRemoteShutdownPrivilege 2888 winupdate.exe Token: SeUndockPrivilege 2888 winupdate.exe Token: SeManageVolumePrivilege 2888 winupdate.exe Token: SeImpersonatePrivilege 2888 winupdate.exe Token: SeCreateGlobalPrivilege 2888 winupdate.exe Token: 33 2888 winupdate.exe Token: 34 2888 winupdate.exe Token: 35 2888 winupdate.exe Token: 36 2888 winupdate.exe Token: SeIncreaseQuotaPrivilege 4488 winupdate.exe Token: SeSecurityPrivilege 4488 winupdate.exe Token: SeTakeOwnershipPrivilege 4488 winupdate.exe Token: SeLoadDriverPrivilege 4488 winupdate.exe Token: SeSystemProfilePrivilege 4488 winupdate.exe Token: SeSystemtimePrivilege 4488 winupdate.exe Token: SeProfSingleProcessPrivilege 4488 winupdate.exe Token: SeIncBasePriorityPrivilege 4488 winupdate.exe Token: SeCreatePagefilePrivilege 4488 winupdate.exe Token: SeBackupPrivilege 4488 winupdate.exe Token: SeRestorePrivilege 4488 winupdate.exe Token: SeShutdownPrivilege 4488 winupdate.exe Token: SeDebugPrivilege 4488 winupdate.exe Token: SeSystemEnvironmentPrivilege 4488 winupdate.exe Token: SeChangeNotifyPrivilege 4488 winupdate.exe Token: SeRemoteShutdownPrivilege 4488 winupdate.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 60 explorer.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4840 wrote to memory of 2904 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 87 PID 4840 wrote to memory of 2904 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 87 PID 4840 wrote to memory of 2904 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 87 PID 4840 wrote to memory of 2888 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 88 PID 4840 wrote to memory of 2888 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 88 PID 4840 wrote to memory of 2888 4840 eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe 88 PID 2888 wrote to memory of 3148 2888 winupdate.exe 91 PID 2888 wrote to memory of 3148 2888 winupdate.exe 91 PID 2888 wrote to memory of 3148 2888 winupdate.exe 91 PID 2888 wrote to memory of 4488 2888 winupdate.exe 92 PID 2888 wrote to memory of 4488 2888 winupdate.exe 92 PID 2888 wrote to memory of 4488 2888 winupdate.exe 92 PID 4488 wrote to memory of 2704 4488 winupdate.exe 93 PID 4488 wrote to memory of 2704 4488 winupdate.exe 93 PID 4488 wrote to memory of 2704 4488 winupdate.exe 93 PID 4488 wrote to memory of 2044 4488 winupdate.exe 94 PID 4488 wrote to memory of 2044 4488 winupdate.exe 94 PID 4488 wrote to memory of 2044 4488 winupdate.exe 94 PID 2044 wrote to memory of 60 2044 winupdate.exe 95 PID 2044 wrote to memory of 60 2044 winupdate.exe 95 PID 2044 wrote to memory of 60 2044 winupdate.exe 95 PID 2044 wrote to memory of 60 2044 winupdate.exe 95 PID 2044 wrote to memory of 60 2044 winupdate.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eac90624b777b28d1049dbb907d15a5f_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵PID:2904
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:3148
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"3⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"4⤵PID:2704
-
-
C:\Windows\SysWOW64\Windupdt\winupdate.exe"C:\Windows\system32\Windupdt\winupdate.exe"4⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- Adds Run key to start application
- Checks whether UAC is enabled
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Writes to the Master Boot Record (MBR)
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:60
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Modify Registry
2Pre-OS Boot
1Bootkit
1Virtualization/Sandbox Evasion
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.9MB
MD5eac90624b777b28d1049dbb907d15a5f
SHA11edfec839bd5dade13e637e37a4d9e434dcc6d62
SHA2564219e3fde43f1a64d937cf29a91cd2894986aea3dcaee98ec4fb2de9fabfd4e6
SHA512a04b731c7c23b794f3a2f4ed72dde9243c642548e6a82662833cfb7bcb9e5b208628babf1a7fba9448fb30fa67dde6a2393ebd6284858bd4f053ca9b44baa1cb