Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 04:27
Static task
static1
Behavioral task
behavioral1
Sample
f52ef977885850cabe59782db6385a64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f52ef977885850cabe59782db6385a64_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f52ef977885850cabe59782db6385a64_JaffaCakes118.exe
-
Size
776KB
-
MD5
f52ef977885850cabe59782db6385a64
-
SHA1
094690ae6f4ae2ac651385dfb02099f62bea50a1
-
SHA256
eb67d9e27db06ea3749c7df09fa5815edd0d430e4da202072fc3c00026349c6d
-
SHA512
19d3e89cd276580d5b51e5deffc442459b610f30e0629a1f49748d89b4a26bdde6b1ddc5c8a6b779adcfb6f19cae318f668fafef0dca4fbb4330e00cd5920483
-
SSDEEP
24576:aXytXN4FXT6SdqtURjZnli5kRlM7fDG/:OytX6RTjqtURjZlaGlM7D6
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate windows_update.exe -
Executes dropped EXE 20 IoCs
pid Process 532 windows_update.exe 1836 windows_update.exe 2224 windows_update.exe 2560 windows_update.exe 640 windows_update.exe 1972 windows_update.exe 1752 windows_update.exe 1692 windows_update.exe 2536 windows_update.exe 2900 windows_update.exe 2852 windows_update.exe 1604 windows_update.exe 2116 windows_update.exe 1780 windows_update.exe 3028 windows_update.exe 892 windows_update.exe 2268 windows_update.exe 2988 windows_update.exe 1032 windows_update.exe 2868 windows_update.exe -
Loads dropped DLL 64 IoCs
pid Process 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 532 windows_update.exe 532 windows_update.exe 532 windows_update.exe 532 windows_update.exe 1836 windows_update.exe 1836 windows_update.exe 1836 windows_update.exe 1836 windows_update.exe 2224 windows_update.exe 2224 windows_update.exe 2224 windows_update.exe 2224 windows_update.exe 2560 windows_update.exe 2560 windows_update.exe 2560 windows_update.exe 2560 windows_update.exe 640 windows_update.exe 640 windows_update.exe 640 windows_update.exe 640 windows_update.exe 1972 windows_update.exe 1972 windows_update.exe 1972 windows_update.exe 1972 windows_update.exe 1752 windows_update.exe 1752 windows_update.exe 1752 windows_update.exe 1752 windows_update.exe 1692 windows_update.exe 1692 windows_update.exe 1692 windows_update.exe 1692 windows_update.exe 2536 windows_update.exe 2536 windows_update.exe 2536 windows_update.exe 2536 windows_update.exe 2900 windows_update.exe 2900 windows_update.exe 2900 windows_update.exe 2900 windows_update.exe 2852 windows_update.exe 2852 windows_update.exe 2852 windows_update.exe 2852 windows_update.exe 1604 windows_update.exe 1604 windows_update.exe 1604 windows_update.exe 1604 windows_update.exe 2116 windows_update.exe 2116 windows_update.exe 2116 windows_update.exe 2116 windows_update.exe 1780 windows_update.exe 1780 windows_update.exe 1780 windows_update.exe 1780 windows_update.exe 3028 windows_update.exe 3028 windows_update.exe 3028 windows_update.exe 3028 windows_update.exe 892 windows_update.exe 892 windows_update.exe 892 windows_update.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe f52ef977885850cabe59782db6385a64_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe f52ef977885850cabe59782db6385a64_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cgNVKr\x7fn@f{STJPAZ\\IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\wzKur = "MlfgXi@iTMWmH[bKBQe^v_Gy" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_`wNVKr\x7fnCv{STJPAK\\IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\wzKur = "MlfgXi@iTMWmH[bKBQe^v_Gy" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cWNVKr\x7fn@V{STJPA^lIBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cGNVKr\x7fn@F{STJPAZ\\IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFj~i]wKePu[\x7fi`" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Version f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_bGNVKr\x7fnAF{STJPAULIBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_bwNVKr\x7fnAv{STJPAULIBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFiBi]wKeaD}z]p" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFjFi]wKeKW`uJP" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Version\ = "9.4" f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zynefqbswXw = "pXMblZ~^aTCqd{XBj}}LxDkr^MFU_F" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\wzKur = "MlfgXi@iTMWmH[bKBQe^v_Gy" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFivi]wKewOfCX@" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFiji]wKe^KF`|@" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFjZi]wKePXq`L@" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFjzi]wKe|w~_fp" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ToolboxBitmap32\ = "C:\\PROGRA~2\\MICROS~1\\Office14\\OUTLOOK.EXE,5511" f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFibi]wKehITLU@" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\wzKur = "MlfgXi@iTMWmH[bKBQe^v_Gy" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zynefqbswXw = "pXMblZ~^aTCqd{XBj}}LxDkr^MFU_F" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_`wNVKr\x7fnCv{STJPAOlIBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cwNVKr\x7fn@v{STJPAZ\\IBvCnaGZ" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgID f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFh~i]wKebuWB@p" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFhzi]wKeuvyF]P" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cGNVKr\x7fn@F{STJPA^lIBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zynefqbswXw = "pXMblZ~^aTCqd{XBj}}LxDkr^MFU_F" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFjBi]wKedlFoI@" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32\14.0.0.0\Class = "Microsoft.Office.Interop.Outlook.OlkDateControlClass" f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cWNVKr\x7fn@V{STJPAR|IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFi^i]wKe\x7fqQ]QP" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFj^i]wKeQSDCKp" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_`wNVKr\x7fnCv{STJPAK\\IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_bgNVKr\x7fnAf{STJPAQLIBvCnaGZ" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocHandler32 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFhvi]wKeAqSfL`" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_`GNVKr\x7fnCF{STJPAC|IBvCnaGZ" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Control f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFini]wKerIc@sP" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_`WNVKr\x7fnCV{STJPAFLIBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Stwxlyuq = "D]h\x7fBBUznRhUm^B|FifUNB_VmpKjLbfe" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\ProgID\ = "Outlook.OlkDateControl.1" f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFhfi]wKemhe{vP" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zynefqbswXw = "pXMblZ~^aTCqd{XBj}}LxDkr^MFU_F" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFjJi]wKe\x7fPJU[`" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_`gNVKr\x7fnCf{STJPAK\\IBvCnaGZ" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\InprocServer32 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFhri]wKef[JSPp" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFiRi]wKedgUyZ`" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFizi]wKeUwhtd@" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\VersionIndependentProgID f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\wzKur = "MlfgXi@iTMWmH[bKBQe^v_Gy" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_cwNVKr\x7fn@v{STJPAZ\\IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFifi]wKeDKqlZP" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFjVi]wKed_[@]p" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zynefqbswXw = "pXMblZ~^aTCqd{XBj}}LxDkr^MFU_F" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\cqmvCjs = "RaYvHS{EKBFhni]wKebVzs|P" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\zynefqbswXw = "pXMblZ~^aTCqd{XBj}}LxDkr^MFU_F" windows_update.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\Typelib f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\BmbAvva = "n\\ntG_bgNVKr\x7fnAf{STJPAR|IBvCnaGZ" windows_update.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{BD211730-848A-F6FE-25B7-CBFA4A410CDA}\wzKur = "MlfgXi@iTMWmH[bKBQe^v_Gy" windows_update.exe -
NTFS ADS 11 IoCs
description ioc Process File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File created C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe File opened for modification C:\ProgramData\TEMP:C980DA7D windows_update.exe -
Runs .reg file with regedit 11 IoCs
pid Process 2540 regedit.exe 2888 regedit.exe 600 regedit.exe 1220 regedit.exe 1744 regedit.exe 2244 regedit.exe 924 regedit.exe 2236 regedit.exe 1076 regedit.exe 2468 regedit.exe 2788 regedit.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: 33 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Token: 33 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe Token: 33 1836 windows_update.exe Token: SeIncBasePriorityPrivilege 1836 windows_update.exe Token: 33 1836 windows_update.exe Token: SeIncBasePriorityPrivilege 1836 windows_update.exe Token: 33 2560 windows_update.exe Token: SeIncBasePriorityPrivilege 2560 windows_update.exe Token: 33 2560 windows_update.exe Token: SeIncBasePriorityPrivilege 2560 windows_update.exe Token: 33 1972 windows_update.exe Token: SeIncBasePriorityPrivilege 1972 windows_update.exe Token: 33 1972 windows_update.exe Token: SeIncBasePriorityPrivilege 1972 windows_update.exe Token: 33 1692 windows_update.exe Token: SeIncBasePriorityPrivilege 1692 windows_update.exe Token: 33 1692 windows_update.exe Token: SeIncBasePriorityPrivilege 1692 windows_update.exe Token: 33 2900 windows_update.exe Token: SeIncBasePriorityPrivilege 2900 windows_update.exe Token: 33 2900 windows_update.exe Token: SeIncBasePriorityPrivilege 2900 windows_update.exe Token: 33 1604 windows_update.exe Token: SeIncBasePriorityPrivilege 1604 windows_update.exe Token: 33 1604 windows_update.exe Token: SeIncBasePriorityPrivilege 1604 windows_update.exe Token: 33 1780 windows_update.exe Token: SeIncBasePriorityPrivilege 1780 windows_update.exe Token: 33 1780 windows_update.exe Token: SeIncBasePriorityPrivilege 1780 windows_update.exe Token: 33 892 windows_update.exe Token: SeIncBasePriorityPrivilege 892 windows_update.exe Token: 33 892 windows_update.exe Token: SeIncBasePriorityPrivilege 892 windows_update.exe Token: 33 2988 windows_update.exe Token: SeIncBasePriorityPrivilege 2988 windows_update.exe Token: 33 2988 windows_update.exe Token: SeIncBasePriorityPrivilege 2988 windows_update.exe Token: 33 2868 windows_update.exe Token: SeIncBasePriorityPrivilege 2868 windows_update.exe Token: 33 2868 windows_update.exe Token: SeIncBasePriorityPrivilege 2868 windows_update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2132 wrote to memory of 2084 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2084 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2084 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 32 PID 2132 wrote to memory of 2084 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 32 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2568 wrote to memory of 2132 2568 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 31 PID 2084 wrote to memory of 2888 2084 cmd.exe 33 PID 2084 wrote to memory of 2888 2084 cmd.exe 33 PID 2084 wrote to memory of 2888 2084 cmd.exe 33 PID 2084 wrote to memory of 2888 2084 cmd.exe 33 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 2132 wrote to memory of 532 2132 f52ef977885850cabe59782db6385a64_JaffaCakes118.exe 34 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35 PID 532 wrote to memory of 1836 532 windows_update.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f52ef977885850cabe59782db6385a64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f52ef977885850cabe59782db6385a64_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\f52ef977885850cabe59782db6385a64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f52ef977885850cabe59782db6385a64_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2888
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 732 "C:\Users\Admin\AppData\Local\Temp\f52ef977885850cabe59782db6385a64_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 732 "C:\Users\Admin\AppData\Local\Temp\f52ef977885850cabe59782db6385a64_JaffaCakes118.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1836 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2236
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 804 "C:\Windows\SysWOW64\windows_update.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 804 "C:\Windows\SysWOW64\windows_update.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2560 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:600
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 824 "C:\Windows\SysWOW64\windows_update.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 824 "C:\Windows\SysWOW64\windows_update.exe"8⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1220
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 836 "C:\Windows\SysWOW64\windows_update.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 836 "C:\Windows\SysWOW64\windows_update.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1692 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1076
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 852 "C:\Windows\SysWOW64\windows_update.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 852 "C:\Windows\SysWOW64\windows_update.exe"12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat13⤵
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg14⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2468
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 860 "C:\Windows\SysWOW64\windows_update.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 860 "C:\Windows\SysWOW64\windows_update.exe"14⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat15⤵
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg16⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2788
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 876 "C:\Windows\SysWOW64\windows_update.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 876 "C:\Windows\SysWOW64\windows_update.exe"16⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat17⤵
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg18⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1744
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 884 "C:\Windows\SysWOW64\windows_update.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3028 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 884 "C:\Windows\SysWOW64\windows_update.exe"18⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat19⤵
- System Location Discovery: System Language Discovery
PID:2240 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg20⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2244
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 896 "C:\Windows\SysWOW64\windows_update.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 896 "C:\Windows\SysWOW64\windows_update.exe"20⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat21⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg22⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:924
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 908 "C:\Windows\SysWOW64\windows_update.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 908 "C:\Windows\SysWOW64\windows_update.exe"22⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- NTFS ADS
- Suspicious use of AdjustPrivilegeToken
PID:2868 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat23⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg24⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2540
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD53ecd369b63e1979a9b035b104ee4a528
SHA1df8df4eaa3ca167b7a69a7d92a1b60b1c196fb3e
SHA256df41f386ce3511d28f2a8d6549bc4acecf85fdf54054e4b1dc58202f1c6ab4e0
SHA5125ac60e926a2a1ed7cd8987c96e7c6f326d27132e49ebe9ae668601d0a4d6732fde4ff7804c83fec315454d5194910be62ad8008a68ec060e14dd098eb70f088c
-
Filesize
105B
MD52f3f9b00fa92103050d0a099410b42ec
SHA1e646045fa7d8b645b93973a4a8fae8ff13890458
SHA25682514066cf186f7a7aa95e14bf1c30515b712d7dde46db63fe4c28aa1d506709
SHA512e935799914e13a6a95591b9b8ff7a49612040997d2ccd4486194b68df4b6c31f1a92cb3f8ad9155c736c47452516dd8d15540389c231ba9fda27c4f026ba6df6
-
Filesize
105B
MD53613abd174b08cdc8b3ef21edb4c8929
SHA1989e2ad2e846d970c0f8143e661464e13097a258
SHA256af4a66b314d21c84e89ffd7491000eb8d07d7dcc464772fe40aff246e1005f09
SHA51219b5d02c7ae114a624bdf6cb31038602ef717e7e597d1b72e9cdad3e05280779145d7c09b195d087408a618027049d4bbf94f122044e7d5340cfd3eaa743bf55
-
Filesize
105B
MD50eadf9574165fc15daeff1c304311cf4
SHA198173fb0166d6f648dac18e9ebc939d7d4153057
SHA256a1afa388591d2687dc157350258f65451636b808cc4048e82854b8b20c22b499
SHA51277b6525eaccb4f89cb5bd42eb668fa873e8e65aeae8a91fcf8385fb151b627747ce2ca8fa65cbed63d469a82499f33019dbfb01d09d76641780d5ba426ab9af9
-
Filesize
105B
MD544d9cd120526c453952c05e474336d75
SHA118505b739f3633498a59746ac84a6c2fbdb88bab
SHA25648064e9cd0b35746a4efefdbee2184c88aeb028a23be8fed7ee88ba57413193e
SHA5120bbb88d73c9b1fa1b4c2dcc7d1f6bf70f56a198437b16d2fc9248bf06ff2508aba5195a5a34a68590de364b60219e859724ef05254201f501d1cad9f38fe9abf
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
2KB
MD56dd7ad95427e77ae09861afd77104775
SHA181c2ffe8c63e71f013a07e5794473b60f50c0716
SHA2568eb7ba2c4ca558bb764f1db1ea0da16c08791a79e995704e5c1b9f3e855008c2
SHA512171d8a96006ea9ff2655af49bd3bfc4702ba8573b3e6f93237ee52e0be68dd09e123495f9fbda9ff69d03fe843d9306798cae6c156202d48b8d021722eedc7cb
-
Filesize
3KB
MD5cd085b8c40e69c2bf1eb3d59f8155b99
SHA13499260f24020fe6d54d9d632d34ba2770bb06e0
SHA25610546433db0c1ab764cd632eb0d08d93a530c6e52d1ec7fcb9c1fd32193f2a9c
SHA5123813b8a7f742f6a64da36492447f3f2fee6ea505d7d0dccebede84117ec06101321dfacc7901403ea557171085982ae1a4dc39dd666da9e67d61ea71dfbb8edb
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
776KB
MD5f52ef977885850cabe59782db6385a64
SHA1094690ae6f4ae2ac651385dfb02099f62bea50a1
SHA256eb67d9e27db06ea3749c7df09fa5815edd0d430e4da202072fc3c00026349c6d
SHA51219d3e89cd276580d5b51e5deffc442459b610f30e0629a1f49748d89b4a26bdde6b1ddc5c8a6b779adcfb6f19cae318f668fafef0dca4fbb4330e00cd5920483