Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/09/2024, 09:57
Static task
static1
Behavioral task
behavioral1
Sample
ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe
-
Size
1.7MB
-
MD5
ed58956a966e93b49800731fcff2842a
-
SHA1
ba2040c213946595a888335da82b0db30c95b2eb
-
SHA256
d3340e920c83ea0e55b1a4c3ad353e29cc0a22fa9fd6177ca5b8ab94945e9168
-
SHA512
e78e2b258f8c3f97396be796f57d4442c5043120e81b8625be5c7d8feeb1b5064119e6cb65913680d04103c72ae65fba49b7acb731cd3910ad79e63a7ce110bd
-
SSDEEP
24576:dzO5uEOelK9ntwlENXtejSIlnst8xsr83KSwxRM7L3ICRObfBuCnWQmHmkN:Y18OENXt4u82rhSwxR83DsUCDmHmkN
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion dumpmem.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate dumpmem.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion wuamgrd.exe -
Executes dropped EXE 12 IoCs
pid Process 2388 NetBot_Attacker.exe 2816 dumpmem.exe 2944 wuamgrd.exe 3000 wuamgrd.exe 1864 wuamgrd.exe 1144 wuamgrd.exe 776 wuamgrd.exe 1732 wuamgrd.exe 2752 wuamgrd.exe 2100 wuamgrd.exe 2844 wuamgrd.exe 1388 wuamgrd.exe -
Loads dropped DLL 28 IoCs
pid Process 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 1268 WerFault.exe 1268 WerFault.exe 1268 WerFault.exe 1268 WerFault.exe 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 2816 dumpmem.exe 2816 dumpmem.exe 2944 wuamgrd.exe 2944 wuamgrd.exe 3000 wuamgrd.exe 3000 wuamgrd.exe 1864 wuamgrd.exe 1864 wuamgrd.exe 1144 wuamgrd.exe 1144 wuamgrd.exe 776 wuamgrd.exe 776 wuamgrd.exe 1732 wuamgrd.exe 1732 wuamgrd.exe 2752 wuamgrd.exe 2752 wuamgrd.exe 2100 wuamgrd.exe 2100 wuamgrd.exe 2844 wuamgrd.exe 2844 wuamgrd.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe dumpmem.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File created C:\Windows\SysWOW64\wuamgrd.exe dumpmem.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe File opened for modification C:\Windows\SysWOW64\wuamgrd.exe wuamgrd.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1268 2388 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NetBot_Attacker.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dumpmem.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuamgrd.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\uHjKdk = "hYdxXfY{{viXUs[{po@EyrxBxE|gn" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpZpz|a}I{l" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpYpz|a}DzV" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "Z{X" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpNpz|a}Adw" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "cjt" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\fcUKux = "cq^nJTriJIldO@xMPbWT{JdOK}" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\fcUKux = "cq^nJTriJIldO@xMPbWT{JdOK}" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\uHjKdk = "hYdxXfY{{viXUs[{po@EyrxBxE|gn" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmppCtyIWQSB\x7fv\\tsD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpbpz|a}D\\b" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "tWD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "Lj@" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\dalLze = "lMicWmzabbbO@wpe\\d" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\UoIr = "CpNH}eAD`vRAbzKqFyJQi`^qIFw" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmxpCtyIWQ[B\x7fv\\tsE" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEp[pz|a}Ji~" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "aN@" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\ = "Microsoft Outlook Envelope Object" dumpmem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\UoIr = "YpNH}eAD`vRAbzKqFyJQi`^qIFw" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\uHjKdk = "hYdxXfY{{viXUs[{po@EyrxBxE|gn" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\dalLze = "lMicWmzabbbO@wpe\\d" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpBpz|a}Iaq" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpVpz|a}AG}" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmxpCtyIWQ[B\x7fv\\tsE" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\UoIr = "ppNH}eAD`vRAbzKqFyJQi`^qIFw" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\fcUKux = "cq^nJTriJIldO@xMPbWT{JdOK}" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmxpCtyIWQ[B\x7fv\\tsE" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "fJD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\dalLze = "lMicWmzabbbO@wpe\\d" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "HCx" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpPpz|a}C\\H" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "E|h" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "GkT" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "\x7fLh" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "~Ip" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRm|pCtyIWQ_B\x7fv\\tsD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "j|p" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "Hux" wuamgrd.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\InprocServer32 dumpmem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "omd" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\UoIr = "YpNH}eAD`vRAbzKqFyJQi`^qIFw" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRm~pCtyIWQ]B\x7fv\\tsE" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpXpz|a}Oz\x7f" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpUpz|a}LFG" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmrpCtyIWQQB\x7fv\\tsD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "xDP" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmrpCtyIWQQB\x7fv\\tsD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpcpz|a}NER" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\InprocServer32\ = "C:\\Program Files (x86)\\Microsoft Office\\Office14\\ENVELOPE.DLL" dumpmem.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "{i@" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\fcUKux = "cq^nJTriJIldO@xMPbWT{JdOK}" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRm}pCtyIWQ^B\x7fv\\tsE" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\uHjKdk = "hYdxXfY{{viXUs[{po@EyrxBxE|gn" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmzpCtyIWQYB\x7fv\\tsE" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpCpz|a}Ne~" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\Utro = "k[NVv\\ZEpGpz|a}JnU" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\UoIr = "GpNH}eAD`vRAbzKqFyJQi`^qIFw" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\cpmGUeWAbf = "UjwFICZBIg`xRmspCtyIWQPB\x7fv\\tsD" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "dn\\" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\fcUKux = "cq^nJTriJIldO@xMPbWT{JdOK}" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\vctfOqq = "wDt" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\uHjKdk = "hYdxXfY{{viXUs[{po@EyrxBxE|gn" wuamgrd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{3571969E-C383-C239-1526-065215260652}\UoIr = "epNH}eAD`vRAbzKqFyJQi`^qIFw" wuamgrd.exe -
NTFS ADS 11 IoCs
description ioc Process File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File created C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe File opened for modification C:\ProgramData\TEMP:CE2C623F wuamgrd.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: 33 2816 dumpmem.exe Token: SeIncBasePriorityPrivilege 2816 dumpmem.exe Token: 33 2944 wuamgrd.exe Token: SeIncBasePriorityPrivilege 2944 wuamgrd.exe Token: 33 3000 wuamgrd.exe Token: SeIncBasePriorityPrivilege 3000 wuamgrd.exe Token: 33 1864 wuamgrd.exe Token: SeIncBasePriorityPrivilege 1864 wuamgrd.exe Token: 33 1144 wuamgrd.exe Token: SeIncBasePriorityPrivilege 1144 wuamgrd.exe Token: 33 776 wuamgrd.exe Token: SeIncBasePriorityPrivilege 776 wuamgrd.exe Token: 33 1732 wuamgrd.exe Token: SeIncBasePriorityPrivilege 1732 wuamgrd.exe Token: 33 2752 wuamgrd.exe Token: SeIncBasePriorityPrivilege 2752 wuamgrd.exe Token: 33 2100 wuamgrd.exe Token: SeIncBasePriorityPrivilege 2100 wuamgrd.exe Token: 33 2844 wuamgrd.exe Token: SeIncBasePriorityPrivilege 2844 wuamgrd.exe Token: 33 1388 wuamgrd.exe Token: SeIncBasePriorityPrivilege 1388 wuamgrd.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2176 wrote to memory of 2388 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2388 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2388 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 30 PID 2176 wrote to memory of 2388 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 30 PID 2388 wrote to memory of 1268 2388 NetBot_Attacker.exe 31 PID 2388 wrote to memory of 1268 2388 NetBot_Attacker.exe 31 PID 2388 wrote to memory of 1268 2388 NetBot_Attacker.exe 31 PID 2388 wrote to memory of 1268 2388 NetBot_Attacker.exe 31 PID 2176 wrote to memory of 2816 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2816 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2816 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 33 PID 2176 wrote to memory of 2816 2176 ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe 33 PID 2816 wrote to memory of 2944 2816 dumpmem.exe 34 PID 2816 wrote to memory of 2944 2816 dumpmem.exe 34 PID 2816 wrote to memory of 2944 2816 dumpmem.exe 34 PID 2816 wrote to memory of 2944 2816 dumpmem.exe 34 PID 2944 wrote to memory of 3000 2944 wuamgrd.exe 35 PID 2944 wrote to memory of 3000 2944 wuamgrd.exe 35 PID 2944 wrote to memory of 3000 2944 wuamgrd.exe 35 PID 2944 wrote to memory of 3000 2944 wuamgrd.exe 35 PID 3000 wrote to memory of 1864 3000 wuamgrd.exe 36 PID 3000 wrote to memory of 1864 3000 wuamgrd.exe 36 PID 3000 wrote to memory of 1864 3000 wuamgrd.exe 36 PID 3000 wrote to memory of 1864 3000 wuamgrd.exe 36 PID 1864 wrote to memory of 1144 1864 wuamgrd.exe 37 PID 1864 wrote to memory of 1144 1864 wuamgrd.exe 37 PID 1864 wrote to memory of 1144 1864 wuamgrd.exe 37 PID 1864 wrote to memory of 1144 1864 wuamgrd.exe 37 PID 1144 wrote to memory of 776 1144 wuamgrd.exe 38 PID 1144 wrote to memory of 776 1144 wuamgrd.exe 38 PID 1144 wrote to memory of 776 1144 wuamgrd.exe 38 PID 1144 wrote to memory of 776 1144 wuamgrd.exe 38 PID 776 wrote to memory of 1732 776 wuamgrd.exe 39 PID 776 wrote to memory of 1732 776 wuamgrd.exe 39 PID 776 wrote to memory of 1732 776 wuamgrd.exe 39 PID 776 wrote to memory of 1732 776 wuamgrd.exe 39 PID 1732 wrote to memory of 2752 1732 wuamgrd.exe 40 PID 1732 wrote to memory of 2752 1732 wuamgrd.exe 40 PID 1732 wrote to memory of 2752 1732 wuamgrd.exe 40 PID 1732 wrote to memory of 2752 1732 wuamgrd.exe 40 PID 2752 wrote to memory of 2100 2752 wuamgrd.exe 41 PID 2752 wrote to memory of 2100 2752 wuamgrd.exe 41 PID 2752 wrote to memory of 2100 2752 wuamgrd.exe 41 PID 2752 wrote to memory of 2100 2752 wuamgrd.exe 41 PID 2100 wrote to memory of 2844 2100 wuamgrd.exe 42 PID 2100 wrote to memory of 2844 2100 wuamgrd.exe 42 PID 2100 wrote to memory of 2844 2100 wuamgrd.exe 42 PID 2100 wrote to memory of 2844 2100 wuamgrd.exe 42 PID 2844 wrote to memory of 1388 2844 wuamgrd.exe 43 PID 2844 wrote to memory of 1388 2844 wuamgrd.exe 43 PID 2844 wrote to memory of 1388 2844 wuamgrd.exe 43 PID 2844 wrote to memory of 1388 2844 wuamgrd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ed58956a966e93b49800731fcff2842a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\NetBot_Attacker.exeC:\Users\Admin\AppData\Local\Temp\NetBot_Attacker.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2388 -s 923⤵
- Loads dropped DLL
- Program crash
PID:1268
-
-
-
\??\c:\windows\temp\dumpmem.exec:\windows\temp\dumpmem.exe2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 640 "c:\windows\temp\dumpmem.exe"3⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 736 "C:\Windows\SysWOW64\wuamgrd.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 744 "C:\Windows\SysWOW64\wuamgrd.exe"5⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 748 "C:\Windows\SysWOW64\wuamgrd.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 740 "C:\Windows\SysWOW64\wuamgrd.exe"7⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 752 "C:\Windows\SysWOW64\wuamgrd.exe"8⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 760 "C:\Windows\SysWOW64\wuamgrd.exe"9⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 768 "C:\Windows\SysWOW64\wuamgrd.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 764 "C:\Windows\SysWOW64\wuamgrd.exe"11⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\wuamgrd.exeC:\Windows\system32\wuamgrd.exe 784 "C:\Windows\SysWOW64\wuamgrd.exe"12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1388
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
112B
MD5e582fdc070a07a4178d74a3bdb015163
SHA1b4f1d7dac5417bb597900165df7f94b507a73c25
SHA2562b9929252552c1196534ec35b6f8ed9c34447206618caa40259249d4136c59ed
SHA51244b3bcb82229c02cfb9e6184c748da3536f21ea22fddc7df86c366c9d60ee5ae2e3dbb9916c59470c2b10303c15f6e5db104a921d04e264df200425335f493ab
-
Filesize
112B
MD58b0b371f02997fbc2827590a1aea7bd4
SHA185c977427ec47da08ed5fdbd79ba849db7db45d4
SHA256802bf5e5abccd8f2e3d3bd1eff6d94aaaa5507553a662f025cf15b315c7f1df8
SHA512ab794584326e14788cfc6c9031195fef2f650e94f8dabf883852f9eec902747aeb05fe69ea95f9e0a497392f37037ed8f726d6ef698079dd92f4cd5ae51b9d79
-
Filesize
112B
MD5e6872f357751c99311bc77394894fc48
SHA10edd27304d074f8e9dc4e36043768ab836d9fbec
SHA256d9916f96a7de82d9c802ad0c54925b2863b18704a3764cc318e3f4147cdac530
SHA512305c459861579ba5fb697cceb8c7a2521d5ca56a4cd1b4a55d715c6f17dba0a053c056f03c51250487d78646450efe29af59d4e5c4632de3f94a175015a8d490
-
Filesize
112B
MD51ee6175f603331713d02fc9531f2fde6
SHA1a0afc5dd188e3e753248cade2838a8bc5e9a9c28
SHA2568eb5c8a0d6c87864aea71c570cb4f68bbc2f6e4b958841b6e71ee76bb4ef6fd7
SHA51202aeca27f3c54b9d5e8cce23dd3f88bf519f8685192d10b82ce2017fe71bf62d4f50578fda8e43ff09d8899647796b58392c6b6877c8e4c3eb76db35bd6120fb
-
Filesize
112B
MD55a7836a7351b9914951e0382165e76f6
SHA1bb66b97e0d01e708b3e9b588edcefa89889d11d3
SHA2560afd888181f7e5024dd0ea81f1a0c418432192775e897173ec72a603d769272f
SHA512ea3b4fdca609f6c758e90f678a1d097cc91b1873fcc71c1881709c82e18bbccc999e5080f604658c520d4ee79cac18f4255fc4b3a4d11912b44e71232d36f733
-
Filesize
112B
MD526b95bdf3ee6fb01cd3df5bb7af843d8
SHA136f5192b8d09dad2b121f0792f4e528c3917c37d
SHA2565ad4b123636adda63dfc1b279085f24a49593d669ddb54718e3f607e5f999817
SHA51295ab679ae358c90af6f1d3aafe22f098665934debd5677a6eeaca5016eec7a206086af284b00d6e36c3dfe6cfc3a0da73c514092b48d3de4ed6f0508ffeb3f52
-
Filesize
112B
MD52da7f54330ffecf3a518a027ca789e7e
SHA12ca8cfd92e4c1ef1e794fecc8a2a5b88a7b626df
SHA2561ff9752f4ca26bae26f7dbd020ae564ac5f51a28422f2f213132f8321c26f875
SHA51209e0706817698f6bcf49ae61bcdda3c7b60675da0ad7930b455207d0bc4e76f33c67a0c59705970f88a912602494390e0f8a978cc573090c55ba1312e2e61e89
-
Filesize
112B
MD5bfbbacbf917c0eacf91a49a0ded4cd44
SHA1cc9d5fb48046191e30b3a0ac8b32921c1ff965a0
SHA2564427f28cc94eec8dbb5f37d170f672ca6d098262dbd6756cf45a85906fd50bd1
SHA512cb2e1432322d93762de4ffc3c93c50fc9dc577934deeb19a189735100cee2ed0789da328788bef05d2368da49c5120e340d83d24d96f377891f6fa5e0f94999e
-
Filesize
112B
MD5d84b4b22a0f656276403f4015e2ea87d
SHA1825942337ccde20a641904e9cc30d6538118a48f
SHA256294bc5445934de3fd1bd39c364f9f3deb310a815b74eefee2bd9875f7a41af32
SHA51284477670c46635c5e64c0789cea88b7d3ea351400d4b333294d85015ab1d13ab8564c1bea4747e40ea38d8c2f73b516b1375e6e9e5ee2a7c0b9da552aeb141c6
-
Filesize
112B
MD5a7e5221ddedc7b3d1519e3dcb9453af5
SHA10fe4222465eb0b8781695c6f7f4864c5bf9f74e1
SHA25671e339649ca2ef9546b3d2c9600563d24ccbbf8638f47fc67db1d1359b383b21
SHA512d09bcd2d82a842858eff22ada7c995654b8931374f7ba4098b8ff66d8f358d1f1046a00cf90460c5c9c10300358943d07f25613cd6fffd8aa915b7f706b773dc
-
Filesize
112B
MD5f3beda8fe2153783ff2e33ce61904979
SHA1584ba3d9e1b35994e75caa52464b82af04957fd9
SHA2563eb00ea7bb59b85b260f27ba04c0848dcbdfcd0750f7be14615b2cc306051e1e
SHA512a184d0c5e6bcdeb566ee2a2a749f67512d6419e054a8e484d12e1002ac5124d89186b78fe59b75f07e730c23d1c4029b620e02a986649bea3e915c9c1dffb685
-
Filesize
112B
MD5bae81d481abb34e7c911e6397bdbaac4
SHA1bd10440da0c39af305605dbfd5b807d43e095e7c
SHA256b9d322496ea8d4290f3e90ac95e15f6ddba903e3109e4a6017c8442650b0909d
SHA512a50252cd93bb9626c93fa19e4698374ee1baf1adaa03dc75e80ac6005a40839a3695f6411a79fe0f1d41fa1dd4e63892eb56bdad65e054f897b37dd5fa81ab8e
-
Filesize
112B
MD54639f1954ccdea3d379f68a51e14d75f
SHA1aaca3f348168823719f1cc73fdb658fbb4b1f9e1
SHA256cdc023b7436eca3f6306b934ee187bff5a25ec5401a9e1ceb48fb86bfadba106
SHA512a95c9d4a62b989a4d014d48e332bf98131240b7dd3b5e0e759ba4f80111ce0cea2403198dcc3940facece8bc7d31b8ac6669a38e17c03f7fede3e4b055b0a851
-
Filesize
112B
MD5ed66b8138074e4d35ad55a4cb3b191d1
SHA1d00aafebe139a03d9452300e89db72d5cd68f9ba
SHA2569217a569171fc7fa097302720d94ebfd9f41e1f17f1d652c091d2fbf8e66c9bd
SHA5123ef8b42d0f8d3b00b6d07886aaaf50df2b4de8a25f78570b6688d3b65f0fd3dfe947f3ed99d282e71f6caa7261a1ebfd70ccd2c6a8ed536fc90cc78173bcd989
-
Filesize
112B
MD5e1b04619abaf65ac2b0213c0ba68f42c
SHA148618c82f7924dfa09ae9481f6c2b7492a24712e
SHA2563f3c67ff05c15f5aa32f2e5f14ea906914347f1c01051ef1af48d1866bea4dd0
SHA512cb834dbc890d9d52197b41a8608dfeee4750139309dc4affc38c616626f2d724bc902fdbb03b1fcfe5302a0b4507b643c5597afbf261edad6ebb5e7afdf1079d
-
Filesize
112B
MD528e4f2cb5cce3116f20bcfd6c8166b2d
SHA13d5060f7f6d5831a8549cef65eb9494dcb6ac9f0
SHA2567b5167e1bfe59fe5b9b4a1773283234e7e68e45edc01b36d39ebcff8aa95b9b8
SHA512a8c92dc28ac37c8773a97ad269a301d8a4d0ecc74ff1c744cefbbbec96fb18e2eabd732be79bd2979e40f17fc46524131fbd729e5a8b237336cd333bc2b0356f
-
Filesize
112B
MD528c5197bd9306a63c939addb482dd1db
SHA1df2b5ab4653b7df5b830579f1f3a2ed1284977f3
SHA256d73cf0338f11b768e80b674c220c6e551e801f520b34008681cfa1e26dbcf8a6
SHA51228a93c5b5b31dc05375d38035bbc5e1195e18929f1ab2b2a5ae42cbba4048b1ebef409930d58f86d435084f45ed2a91bb082c76b515739528e68e3a88d6a3deb
-
Filesize
872KB
MD56d739905bd6962378d3126509de91d13
SHA1848bb1805d650f7b42a15eb95f65911a86d36a94
SHA2561b5679e5d6d196a753ef94e5015b9b323fb897b12dd83d7b34fc98c17284c774
SHA512ff297e451e40d673ae041f7d99f1259188284766a966afe59ff492ab712cba0d6df5195c1d8c8828304c562a9d48f46a8aa71ef6c574ca7bb216bc19d4b37108
-
Filesize
844KB
MD53fa8cb560504fe14923cdd790d258092
SHA1c46676477909dfff3c182ea0752cb38ad8fdbc27
SHA2568f1cebc046bad09f335da363c4b530e2b9105ee73d78e6cc292d9f605cc00be6
SHA5120398767c55e16dfc0a50a4b57bbc3558b77d7075cbfcdb33439164ef9c1ff2f33db0e3ff2e66c0d00ec4a5561817c143bcea2d326fbf30bdc15b36acbb0ea80a