Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 14:35
Static task
static1
Behavioral task
behavioral1
Sample
eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe
-
Size
173KB
-
MD5
eb8a3571920b843162e6a702ca5ff15c
-
SHA1
7356308207c0624ac99c35e6d34b8cce07920c43
-
SHA256
a52acc11ae2386ceb7aa29472f9eec91f8f45c018f01bd2bc4a2bc0a8b453897
-
SHA512
16d9ea99ca3882c09088d6ea6d34a182d7b96fc5f91a5dd94b62c2bbd27c35d984449d1cc15a74db98b55e3ccc2db432d83ea18f1455b88eea7db7477c3f142e
-
SSDEEP
3072:6qn8Vg88+9v2GFDB75JIjS/Fv7nRyeC5MIHFNMvEYR0KCjg7Sst:6qn88+zFDB9yjS/1OaIlNM8YBCcxt
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks computer location settings 2 TTPs 31 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe Key value queried \REGISTRY\USER\S-1-5-21-2412658365-3084825385-3340777666-1000\Control Panel\International\Geo\Nation MsTpClient.exe -
Deletes itself 1 IoCs
pid Process 3140 MsTpClient.exe -
Executes dropped EXE 62 IoCs
pid Process 3652 MsTpClient.exe 3140 MsTpClient.exe 3276 MsTpClient.exe 2292 MsTpClient.exe 220 MsTpClient.exe 4608 MsTpClient.exe 4652 MsTpClient.exe 4572 MsTpClient.exe 3076 MsTpClient.exe 4008 MsTpClient.exe 1308 MsTpClient.exe 3932 MsTpClient.exe 4848 MsTpClient.exe 4944 MsTpClient.exe 1764 MsTpClient.exe 4356 MsTpClient.exe 4888 MsTpClient.exe 408 MsTpClient.exe 2968 MsTpClient.exe 720 MsTpClient.exe 3848 MsTpClient.exe 2944 MsTpClient.exe 2492 MsTpClient.exe 3036 MsTpClient.exe 4588 MsTpClient.exe 4232 MsTpClient.exe 8 MsTpClient.exe 3652 MsTpClient.exe 2812 MsTpClient.exe 4496 MsTpClient.exe 2904 MsTpClient.exe 3916 MsTpClient.exe 220 MsTpClient.exe 2868 MsTpClient.exe 2728 MsTpClient.exe 4856 MsTpClient.exe 3464 MsTpClient.exe 3524 MsTpClient.exe 1956 MsTpClient.exe 1064 MsTpClient.exe 2272 MsTpClient.exe 4268 MsTpClient.exe 2992 MsTpClient.exe 1504 MsTpClient.exe 2472 MsTpClient.exe 1712 MsTpClient.exe 2800 MsTpClient.exe 3956 MsTpClient.exe 1928 MsTpClient.exe 4320 MsTpClient.exe 2660 MsTpClient.exe 864 MsTpClient.exe 2420 MsTpClient.exe 4432 MsTpClient.exe 2844 MsTpClient.exe 388 MsTpClient.exe 4328 MsTpClient.exe 3816 MsTpClient.exe 4224 MsTpClient.exe 2812 MsTpClient.exe 2040 MsTpClient.exe 4668 MsTpClient.exe -
resource yara_rule behavioral2/memory/1496-0-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1496-2-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1496-3-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1496-4-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1496-38-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3140-44-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3140-47-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/2292-54-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4608-61-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4572-68-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4008-75-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3932-82-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4944-89-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4356-95-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/408-102-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/720-108-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/2944-116-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3036-126-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4232-134-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3652-143-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4496-151-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3916-159-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/2868-167-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4856-175-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3524-183-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1064-191-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4268-199-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1504-206-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/1712-212-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3956-218-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4320-224-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/864-230-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/4432-236-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/388-242-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/3816-248-0x0000000000400000-0x000000000046F000-memory.dmp upx behavioral2/memory/2812-254-0x0000000000400000-0x000000000046F000-memory.dmp upx -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 MsTpClient.exe -
Drops file in System32 directory 62 IoCs
description ioc Process File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe File created C:\Windows\SysWOW64\MsTpClient.exe eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsTpClient.exe MsTpClient.exe -
Suspicious use of SetThreadContext 31 IoCs
description pid Process procid_target PID 4644 set thread context of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 3652 set thread context of 3140 3652 MsTpClient.exe 88 PID 3276 set thread context of 2292 3276 MsTpClient.exe 91 PID 220 set thread context of 4608 220 MsTpClient.exe 95 PID 4652 set thread context of 4572 4652 MsTpClient.exe 97 PID 3076 set thread context of 4008 3076 MsTpClient.exe 99 PID 1308 set thread context of 3932 1308 MsTpClient.exe 101 PID 4848 set thread context of 4944 4848 MsTpClient.exe 104 PID 4888 set thread context of 408 4888 MsTpClient.exe 109 PID 2968 set thread context of 720 2968 MsTpClient.exe 111 PID 3848 set thread context of 2944 3848 MsTpClient.exe 113 PID 2492 set thread context of 3036 2492 MsTpClient.exe 115 PID 4588 set thread context of 4232 4588 MsTpClient.exe 117 PID 8 set thread context of 3652 8 MsTpClient.exe 119 PID 2812 set thread context of 4496 2812 MsTpClient.exe 121 PID 2904 set thread context of 3916 2904 MsTpClient.exe 123 PID 220 set thread context of 2868 220 MsTpClient.exe 125 PID 2728 set thread context of 4856 2728 MsTpClient.exe 127 PID 3464 set thread context of 3524 3464 MsTpClient.exe 129 PID 1956 set thread context of 1064 1956 MsTpClient.exe 131 PID 2272 set thread context of 4268 2272 MsTpClient.exe 133 PID 2992 set thread context of 1504 2992 MsTpClient.exe 135 PID 2472 set thread context of 1712 2472 MsTpClient.exe 137 PID 2800 set thread context of 3956 2800 MsTpClient.exe 139 PID 1928 set thread context of 4320 1928 MsTpClient.exe 141 PID 2660 set thread context of 864 2660 MsTpClient.exe 143 PID 2420 set thread context of 4432 2420 MsTpClient.exe 145 PID 2844 set thread context of 388 2844 MsTpClient.exe 147 PID 4328 set thread context of 3816 4328 MsTpClient.exe 149 PID 4224 set thread context of 2812 4224 MsTpClient.exe 151 PID 2040 set thread context of 4668 2040 MsTpClient.exe 153 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 63 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsTpClient.exe -
Modifies registry class 31 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ MsTpClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 4644 wrote to memory of 1496 4644 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 82 PID 1496 wrote to memory of 3652 1496 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 85 PID 1496 wrote to memory of 3652 1496 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 85 PID 1496 wrote to memory of 3652 1496 eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe 85 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3652 wrote to memory of 3140 3652 MsTpClient.exe 88 PID 3140 wrote to memory of 3276 3140 MsTpClient.exe 90 PID 3140 wrote to memory of 3276 3140 MsTpClient.exe 90 PID 3140 wrote to memory of 3276 3140 MsTpClient.exe 90 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 3276 wrote to memory of 2292 3276 MsTpClient.exe 91 PID 2292 wrote to memory of 220 2292 MsTpClient.exe 94 PID 2292 wrote to memory of 220 2292 MsTpClient.exe 94 PID 2292 wrote to memory of 220 2292 MsTpClient.exe 94 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 220 wrote to memory of 4608 220 MsTpClient.exe 95 PID 4608 wrote to memory of 4652 4608 MsTpClient.exe 96 PID 4608 wrote to memory of 4652 4608 MsTpClient.exe 96 PID 4608 wrote to memory of 4652 4608 MsTpClient.exe 96 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4652 wrote to memory of 4572 4652 MsTpClient.exe 97 PID 4572 wrote to memory of 3076 4572 MsTpClient.exe 98 PID 4572 wrote to memory of 3076 4572 MsTpClient.exe 98 PID 4572 wrote to memory of 3076 4572 MsTpClient.exe 98 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 3076 wrote to memory of 4008 3076 MsTpClient.exe 99 PID 4008 wrote to memory of 1308 4008 MsTpClient.exe 100 PID 4008 wrote to memory of 1308 4008 MsTpClient.exe 100 PID 4008 wrote to memory of 1308 4008 MsTpClient.exe 100 PID 1308 wrote to memory of 3932 1308 MsTpClient.exe 101 PID 1308 wrote to memory of 3932 1308 MsTpClient.exe 101 PID 1308 wrote to memory of 3932 1308 MsTpClient.exe 101 PID 1308 wrote to memory of 3932 1308 MsTpClient.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb8a3571920b843162e6a702ca5ff15c_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Users\Admin\AppData\Local\Temp\EB8A35~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3652 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Users\Admin\AppData\Local\Temp\EB8A35~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4608 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4652 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4572 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3932 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4848 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4944 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4888 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:720 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3848 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2944 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3036 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4588 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4232 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3652 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3916 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2868 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2728 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4856 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3464 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3524 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1064 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4268 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1504 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2472 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1712 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2800 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4320 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2660 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4432 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2844 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE58⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:388 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4328 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3816 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4224 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2812 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\system32\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\MsTpClient.exe"C:\Windows\SysWOW64\MsTpClient.exe" C:\Windows\SysWOW64\MSTPCL~1.EXE64⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:4668
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173KB
MD5eb8a3571920b843162e6a702ca5ff15c
SHA17356308207c0624ac99c35e6d34b8cce07920c43
SHA256a52acc11ae2386ceb7aa29472f9eec91f8f45c018f01bd2bc4a2bc0a8b453897
SHA51216d9ea99ca3882c09088d6ea6d34a182d7b96fc5f91a5dd94b62c2bbd27c35d984449d1cc15a74db98b55e3ccc2db432d83ea18f1455b88eea7db7477c3f142e