Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
21-09-2024 17:44
Static task
static1
Behavioral task
behavioral1
Sample
f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe
-
Size
209KB
-
MD5
f052347e9314846d6edd49d64df97aeb
-
SHA1
bff4af3dbd5e691828d05b07e64f91cb857a6367
-
SHA256
335a13fd4fa4710e331261898883ef03dda84b293c189fcaf291fe9fdbafc256
-
SHA512
27780ffcd387e69daa27fd431c88555bf88ace7bfe7ba418c1850548540c2d2e33495844fa8b871a97395607a8cefa391cc2e4bd66c201e447fb5767c173361f
-
SSDEEP
6144:hlqtXlhQ8ZK0lAswvP6bQ7yMP+DE827YYscT:hlogQKXd6b7MP+Dd2UYZT
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 4200 WinzAPI32.exe 2200 WinzAPI32.exe 2576 WinzAPI32.exe 3676 WinzAPI32.exe 4248 WinzAPI32.exe 2304 WinzAPI32.exe 3796 WinzAPI32.exe 4628 WinzAPI32.exe 1320 WinzAPI32.exe 3260 WinzAPI32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe File created C:\Windows\SysWOW64\WinzAPI32.exe f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\WinzAPI32.exe WinzAPI32.exe -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WinzAPI32.exe -
Modifies registry class 33 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ WinzAPI32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" WinzAPI32.exe -
Runs .reg file with regedit 11 IoCs
pid Process 3904 regedit.exe 3680 regedit.exe 3188 regedit.exe 4576 regedit.exe 2480 regedit.exe 2080 regedit.exe 5096 regedit.exe 4080 regedit.exe 3188 regedit.exe 4756 regedit.exe 4628 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2972 2044 f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe 82 PID 2044 wrote to memory of 2972 2044 f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe 82 PID 2044 wrote to memory of 2972 2044 f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe 82 PID 2972 wrote to memory of 2480 2972 cmd.exe 83 PID 2972 wrote to memory of 2480 2972 cmd.exe 83 PID 2972 wrote to memory of 2480 2972 cmd.exe 83 PID 2044 wrote to memory of 4200 2044 f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe 84 PID 2044 wrote to memory of 4200 2044 f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe 84 PID 2044 wrote to memory of 4200 2044 f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe 84 PID 4200 wrote to memory of 752 4200 WinzAPI32.exe 85 PID 4200 wrote to memory of 752 4200 WinzAPI32.exe 85 PID 4200 wrote to memory of 752 4200 WinzAPI32.exe 85 PID 752 wrote to memory of 4756 752 cmd.exe 86 PID 752 wrote to memory of 4756 752 cmd.exe 86 PID 752 wrote to memory of 4756 752 cmd.exe 86 PID 4200 wrote to memory of 2200 4200 WinzAPI32.exe 94 PID 4200 wrote to memory of 2200 4200 WinzAPI32.exe 94 PID 4200 wrote to memory of 2200 4200 WinzAPI32.exe 94 PID 2200 wrote to memory of 4356 2200 WinzAPI32.exe 95 PID 2200 wrote to memory of 4356 2200 WinzAPI32.exe 95 PID 2200 wrote to memory of 4356 2200 WinzAPI32.exe 95 PID 4356 wrote to memory of 4628 4356 cmd.exe 96 PID 4356 wrote to memory of 4628 4356 cmd.exe 96 PID 4356 wrote to memory of 4628 4356 cmd.exe 96 PID 2200 wrote to memory of 2576 2200 WinzAPI32.exe 98 PID 2200 wrote to memory of 2576 2200 WinzAPI32.exe 98 PID 2200 wrote to memory of 2576 2200 WinzAPI32.exe 98 PID 2576 wrote to memory of 4496 2576 WinzAPI32.exe 99 PID 2576 wrote to memory of 4496 2576 WinzAPI32.exe 99 PID 2576 wrote to memory of 4496 2576 WinzAPI32.exe 99 PID 4496 wrote to memory of 5096 4496 cmd.exe 100 PID 4496 wrote to memory of 5096 4496 cmd.exe 100 PID 4496 wrote to memory of 5096 4496 cmd.exe 100 PID 2576 wrote to memory of 3676 2576 WinzAPI32.exe 102 PID 2576 wrote to memory of 3676 2576 WinzAPI32.exe 102 PID 2576 wrote to memory of 3676 2576 WinzAPI32.exe 102 PID 3676 wrote to memory of 3468 3676 WinzAPI32.exe 103 PID 3676 wrote to memory of 3468 3676 WinzAPI32.exe 103 PID 3676 wrote to memory of 3468 3676 WinzAPI32.exe 103 PID 3468 wrote to memory of 2080 3468 cmd.exe 104 PID 3468 wrote to memory of 2080 3468 cmd.exe 104 PID 3468 wrote to memory of 2080 3468 cmd.exe 104 PID 3676 wrote to memory of 4248 3676 WinzAPI32.exe 105 PID 3676 wrote to memory of 4248 3676 WinzAPI32.exe 105 PID 3676 wrote to memory of 4248 3676 WinzAPI32.exe 105 PID 4248 wrote to memory of 4064 4248 WinzAPI32.exe 106 PID 4248 wrote to memory of 4064 4248 WinzAPI32.exe 106 PID 4248 wrote to memory of 4064 4248 WinzAPI32.exe 106 PID 4064 wrote to memory of 4080 4064 cmd.exe 107 PID 4064 wrote to memory of 4080 4064 cmd.exe 107 PID 4064 wrote to memory of 4080 4064 cmd.exe 107 PID 4248 wrote to memory of 2304 4248 WinzAPI32.exe 108 PID 4248 wrote to memory of 2304 4248 WinzAPI32.exe 108 PID 4248 wrote to memory of 2304 4248 WinzAPI32.exe 108 PID 2304 wrote to memory of 4804 2304 WinzAPI32.exe 109 PID 2304 wrote to memory of 4804 2304 WinzAPI32.exe 109 PID 2304 wrote to memory of 4804 2304 WinzAPI32.exe 109 PID 4804 wrote to memory of 3188 4804 cmd.exe 110 PID 4804 wrote to memory of 3188 4804 cmd.exe 110 PID 4804 wrote to memory of 3188 4804 cmd.exe 110 PID 2304 wrote to memory of 3796 2304 WinzAPI32.exe 111 PID 2304 wrote to memory of 3796 2304 WinzAPI32.exe 111 PID 2304 wrote to memory of 3796 2304 WinzAPI32.exe 111 PID 3796 wrote to memory of 1416 3796 WinzAPI32.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2480
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1212 "C:\Users\Admin\AppData\Local\Temp\f052347e9314846d6edd49d64df97aeb_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4756
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1176 "C:\Windows\SysWOW64\WinzAPI32.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4628
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1140 "C:\Windows\SysWOW64\WinzAPI32.exe"4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:5096
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1148 "C:\Windows\SysWOW64\WinzAPI32.exe"5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2080
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1144 "C:\Windows\SysWOW64\WinzAPI32.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4248 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4080
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1156 "C:\Windows\SysWOW64\WinzAPI32.exe"7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4804 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3188
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1160 "C:\Windows\SysWOW64\WinzAPI32.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:1416 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3904
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1152 "C:\Windows\SysWOW64\WinzAPI32.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4628 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat10⤵
- System Location Discovery: System Language Discovery
PID:1860 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3680
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1164 "C:\Windows\SysWOW64\WinzAPI32.exe"10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1320 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3188
-
-
-
C:\Windows\SysWOW64\WinzAPI32.exeC:\Windows\system32\WinzAPI32.exe 1168 "C:\Windows\SysWOW64\WinzAPI32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat12⤵
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4576
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5e6d8af5aed642209c88269bf56af50ae
SHA1633d40da997074dc0ed10938ebc49a3aeb3a7fc8
SHA256550abc09abce5b065d360dfea741ab7dd8abbe2ea11cd46b093632860775baec
SHA5126949fc255c1abf009ecbe0591fb6dbfd96409ee98ae438dbac8945684ccf694c046d5b51d2bf7679c1e02f42e8f32e8e29a9b7bdbc84442bec0497b64dfa84cf
-
Filesize
2KB
MD5bef09dc596b7b91eec4f38765e0965b7
SHA1b8bb8d2eb918e0979b08fd1967dac127874b9de5
SHA2568dab724d5941eb7becff35ce1a76e8525dcdca024900e70758300dcdddf8e265
SHA5120bbce4150b47bafb674f2074fdfc20df86edadb85037f93c541d1d53f721ed52e37a49d14522dac56e9d2e9ce801bcdb701509fa02285778a086d547f1be966a
-
Filesize
2KB
MD58a36f3bf3750851d8732b132fa330bb4
SHA11cb36be31f3d7d9439aac14af3d7a27f05a980eb
SHA2565d88aebc1d13a61609ef057cb38dc9d7b0a04a47a7670a7591f40d1ea05b6ad9
SHA512a822885389f3b12baed60b565646bed97aea1740e163e236ca3647fb63a9c15f6e21bc5ff92eb2d47bb6b1268c71ffb8e5e84006f3c04377d9d3a7c16434e646
-
Filesize
298B
MD54117e5a9c995bab9cd3bce3fc2b99a46
SHA180144ccbad81c2efb1df64e13d3d5f59ca4486da
SHA25637b58c2d66ab2f896316ee0cdba30dcc9aac15a51995b8ba6c143c8ba34bf292
SHA512bdb721bd3dea641a9b1f26b46311c05199de01c6b0d7ea2b973aa71a4f796b292a6964ddef32ba9dfc4a545768943d105f110c5d60716e0ff6f82914affb507c
-
Filesize
2KB
MD55575ef034e791d4d3b09da6c0c4ee764
SHA150a0851ddf4b0c4014ad91f976e953baffe30951
SHA2569697ec584ef188873daa789eb779bb95dd3efa2c4c98a55dffa30cac4d156c14
SHA512ecf52614d3a16d8e558751c799fde925650ef3e6d254d172217e1b0ed76a983d45b74688616d3e3432a16cec98b986b17eaecd319a18df9a67e4d47f17380756
-
Filesize
360B
MD53a1a83c2ffad464e87a2f9a502b7b9f1
SHA14ffa65ecdd0455499c8cd6d05947605340cbf426
SHA25673ed949fba75a20288ac2d1e367180d4c8837fd31c66143707768d5b0e3bd8b6
SHA5128232967faaf29b8b93b5042ba2bb1fcb6d0f0f2fa0e19573b1fe49f526ba434c5e76e932829e3c71beb0903e42c293ed202b619fee8aba93efe4a99e8aec55e2
-
Filesize
849B
MD5558ce6da965ba1758d112b22e15aa5a2
SHA1a365542609e4d1dc46be62928b08612fcabe2ede
SHA256c11beaac10a5e00391ef4b41be8c240f59c5a2dc930aead6d7db237fcd2641fb
SHA51237f7f10c3d201b11cc5224ae69c5990eb33b4430c601d3c21f6bec9323621120442e0cfa49e1f4eda459ea4ac750277e446dca78b9e44c1445bd891e4e460b5c
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
2KB
MD5f82bc8865c1f6bf7125563479421f95c
SHA165c25d7af3ab1f29ef2ef1fdc67378ac9c82098d
SHA256f9799dc2afb8128d1925b69fdef1d641f312ed41254dd5f4ac543cf50648a2f6
SHA51200a9b7798a630779dc30296c3d0fed2589e7e86d6941f4502ea301c5bce2e80a5d8a4916e36183c7064f968b539ae6dac49094b1de3643a1a2fedc83cf558825
-
Filesize
3KB
MD57fe70731de9e888ca911baeb99ee503d
SHA10073da5273512f66dbf570580dc55957535c2478
SHA256ec8ce13a4cab475695329eddc61ff2eee378e79f0d2f9ca3a9bc7b18bd52b89a
SHA5124421df7085fd2aac218d5544152d77080b99c1eaa24076975a6b1bb01149a19a1c0d6cc2c042cd507b37af9a220e7ce1f026103cdabfaec5994b1533c2f3eeac
-
Filesize
2KB
MD55da7efcc8d0fcdf2bad7890c3f8a27ca
SHA1681788d5a3044eee8426d431bd786375cd32bf13
SHA2567f142c13b7039582d0f10df0271f0e1feea35760a92bf0c5034f444066c92df8
SHA5126e3281f2350c524f9c24ab4455d4c5a109875ead35a35aba3c085d90f99cbc64c6645dfcb805d7a5e670869e67feb481a655305236be8d716347a7c4696a358b
-
Filesize
3KB
MD50bccb0cc2d0641cd0ac7ce17afe64b9f
SHA1103f5bc2b153913e8a614a7abb43941fe90862a4
SHA256cae50ec401dae988f1221cead7de58cf4301040fd9fbb8d1c4ad032034ee1842
SHA512cce4edc7c607ca3969fb19f93a836d87170e2c50fcf136acb3bcb5500b99b1ae73a999b7d648a3643f58cf960b071b24215e1c59f874ca38a50cf1ef90b06389
-
Filesize
300B
MD59e1df6d58e6c905e4628df434384b3c9
SHA1e67dd641da70aa9654ed24b19ed06a3eb8c0db43
SHA25625bb4f644e47b4b64b0052ec7edfd4c27f370d07ef884078fea685f30b9c1bb0
SHA51293c9f24dc530e08c85776955c200be468d099d8f1d2efe5e20cbb3a1d803fe23e0ba9b589df2498832082a283d79f6f1053a26d15f49e31a0da395ecc7225ad3
-
Filesize
2KB
MD5d8be0d42e512d922804552250f01eb90
SHA1cda2fd8fc9c4cdf15d5e2f07a4c633e21d11c9d3
SHA256901619f668fe541b53d809cd550460f579985c3d2f3d899a557997e778eb1d82
SHA512f53619e1ec3c9abc833f9fca1174529fb4a4723b64f7560059cd3147d74ea8fe945a7bd0034f6fb68c0e61b6782a26908d30a749a256e019031b5a6ac088eb97
-
Filesize
2KB
MD51b2949b211ab497b739b1daf37cd4101
SHA112cad1063d28129ddd89e80acc2940f8dfbbaab3
SHA2563e906a8373d1dfa40782f56710768abd4365933ad60f2ca9e974743c25b4cb6c
SHA512a9e6555d435fe3e7a63059f20cd4c59531319421efcd90ca1d14498c28d9882ab0b7cd1af63dd50fa693b3b5a714db572d61867c56b86618423c7feaf043f2ef
-
Filesize
2KB
MD55855edf3afa67e11de78af0389880d18
SHA1c43fcd36d70a6ffcd41fbb48c1d0c406fd00286f
SHA256c7798759a159989611cdf47f702c8813ad0f029b52f18af573f383859a8bfaaa
SHA5125be99a55f86486c04bda0a089571c296d041dae337321578c0f8d19d7bd2e51802aafbc8716753b6191b8e5ced782a5bc7d44bdd4995ab8e6ac1f7cd4b0f91ee
-
Filesize
209KB
MD5f052347e9314846d6edd49d64df97aeb
SHA1bff4af3dbd5e691828d05b07e64f91cb857a6367
SHA256335a13fd4fa4710e331261898883ef03dda84b293c189fcaf291fe9fdbafc256
SHA51227780ffcd387e69daa27fd431c88555bf88ace7bfe7ba418c1850548540c2d2e33495844fa8b871a97395607a8cefa391cc2e4bd66c201e447fb5767c173361f
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904