Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-09-2024 15:32
Static task
static1
Behavioral task
behavioral1
Sample
f650f5a24a68da19467a30235be01730_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f650f5a24a68da19467a30235be01730_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
f650f5a24a68da19467a30235be01730_JaffaCakes118.exe
-
Size
158KB
-
MD5
f650f5a24a68da19467a30235be01730
-
SHA1
d4a0a4d034a54061e78750678eb60cb6a073967a
-
SHA256
ee97763a532f7d56560fd36b3a9eb1a76b762cf2f4162b367bf9decc2bd80bd8
-
SHA512
3eb35619b8c52809f4e1dc41dbc04083df4696dd72d1a0a0faa887c3f211d11b4f732394f779da6f94699929ce600e66a140f8f5c2650fad8eaa5ce8a0acbb59
-
SSDEEP
3072:whhb3TpnKnlKKxxr2WG9u+L9kZEiRiRdibdoNb6n3hVSPd/Bg:whhDTy9xr2R9VL9CEkEKONbMVSV/Bg
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Deletes itself 1 IoCs
pid Process 832 MsDbClient.exe -
Executes dropped EXE 64 IoCs
pid Process 2060 MsDbClient.exe 832 MsDbClient.exe 2472 MsDbClient.exe 2756 MsDbClient.exe 1696 MsDbClient.exe 2496 MsDbClient.exe 2000 MsDbClient.exe 1028 MsDbClient.exe 1704 MsDbClient.exe 2844 MsDbClient.exe 2140 MsDbClient.exe 2076 MsDbClient.exe 304 MsDbClient.exe 688 MsDbClient.exe 1952 MsDbClient.exe 896 MsDbClient.exe 1920 MsDbClient.exe 1444 MsDbClient.exe 708 MsDbClient.exe 888 MsDbClient.exe 2532 MsDbClient.exe 2368 MsDbClient.exe 2500 MsDbClient.exe 2748 MsDbClient.exe 2492 MsDbClient.exe 2732 MsDbClient.exe 2456 MsDbClient.exe 1856 MsDbClient.exe 2828 MsDbClient.exe 1656 MsDbClient.exe 2852 MsDbClient.exe 2040 MsDbClient.exe 2956 MsDbClient.exe 2440 MsDbClient.exe 2336 MsDbClient.exe 444 MsDbClient.exe 2988 MsDbClient.exe 1004 MsDbClient.exe 952 MsDbClient.exe 1624 MsDbClient.exe 1740 MsDbClient.exe 2184 MsDbClient.exe 332 MsDbClient.exe 2096 MsDbClient.exe 604 MsDbClient.exe 2116 MsDbClient.exe 2908 MsDbClient.exe 2624 MsDbClient.exe 2636 MsDbClient.exe 2684 MsDbClient.exe 1232 MsDbClient.exe 2708 MsDbClient.exe 1432 MsDbClient.exe 1164 MsDbClient.exe 844 MsDbClient.exe 1192 MsDbClient.exe 1620 MsDbClient.exe 1764 MsDbClient.exe 2412 MsDbClient.exe 580 MsDbClient.exe 1084 MsDbClient.exe 2932 MsDbClient.exe 872 MsDbClient.exe 1760 MsDbClient.exe -
Loads dropped DLL 64 IoCs
pid Process 2548 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 2548 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 2060 MsDbClient.exe 832 MsDbClient.exe 832 MsDbClient.exe 2756 MsDbClient.exe 2756 MsDbClient.exe 2496 MsDbClient.exe 2496 MsDbClient.exe 1028 MsDbClient.exe 1028 MsDbClient.exe 2844 MsDbClient.exe 2844 MsDbClient.exe 2076 MsDbClient.exe 2076 MsDbClient.exe 688 MsDbClient.exe 688 MsDbClient.exe 896 MsDbClient.exe 896 MsDbClient.exe 1444 MsDbClient.exe 1444 MsDbClient.exe 888 MsDbClient.exe 888 MsDbClient.exe 2368 MsDbClient.exe 2368 MsDbClient.exe 2748 MsDbClient.exe 2748 MsDbClient.exe 2732 MsDbClient.exe 2732 MsDbClient.exe 1856 MsDbClient.exe 1856 MsDbClient.exe 1656 MsDbClient.exe 1656 MsDbClient.exe 2040 MsDbClient.exe 2040 MsDbClient.exe 2440 MsDbClient.exe 2440 MsDbClient.exe 444 MsDbClient.exe 444 MsDbClient.exe 1004 MsDbClient.exe 1004 MsDbClient.exe 1624 MsDbClient.exe 1624 MsDbClient.exe 2184 MsDbClient.exe 2184 MsDbClient.exe 2096 MsDbClient.exe 2096 MsDbClient.exe 2116 MsDbClient.exe 2116 MsDbClient.exe 2624 MsDbClient.exe 2624 MsDbClient.exe 2684 MsDbClient.exe 2684 MsDbClient.exe 2708 MsDbClient.exe 2708 MsDbClient.exe 1164 MsDbClient.exe 1164 MsDbClient.exe 1192 MsDbClient.exe 1192 MsDbClient.exe 1764 MsDbClient.exe 1764 MsDbClient.exe 580 MsDbClient.exe 580 MsDbClient.exe 2932 MsDbClient.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe f650f5a24a68da19467a30235be01730_JaffaCakes118.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe -
Suspicious use of SetThreadContext 41 IoCs
description pid Process procid_target PID 2556 set thread context of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2060 set thread context of 832 2060 MsDbClient.exe 33 PID 2472 set thread context of 2756 2472 MsDbClient.exe 35 PID 1696 set thread context of 2496 1696 MsDbClient.exe 37 PID 2000 set thread context of 1028 2000 MsDbClient.exe 39 PID 1704 set thread context of 2844 1704 MsDbClient.exe 41 PID 2140 set thread context of 2076 2140 MsDbClient.exe 43 PID 304 set thread context of 688 304 MsDbClient.exe 45 PID 1952 set thread context of 896 1952 MsDbClient.exe 47 PID 1920 set thread context of 1444 1920 MsDbClient.exe 49 PID 708 set thread context of 888 708 MsDbClient.exe 51 PID 2532 set thread context of 2368 2532 MsDbClient.exe 53 PID 2500 set thread context of 2748 2500 MsDbClient.exe 55 PID 2492 set thread context of 2732 2492 MsDbClient.exe 57 PID 2456 set thread context of 1856 2456 MsDbClient.exe 59 PID 2828 set thread context of 1656 2828 MsDbClient.exe 61 PID 2852 set thread context of 2040 2852 MsDbClient.exe 63 PID 2956 set thread context of 2440 2956 MsDbClient.exe 65 PID 2336 set thread context of 444 2336 MsDbClient.exe 67 PID 2988 set thread context of 1004 2988 MsDbClient.exe 69 PID 952 set thread context of 1624 952 MsDbClient.exe 71 PID 1740 set thread context of 2184 1740 MsDbClient.exe 74 PID 332 set thread context of 2096 332 MsDbClient.exe 76 PID 604 set thread context of 2116 604 MsDbClient.exe 78 PID 2908 set thread context of 2624 2908 MsDbClient.exe 80 PID 2636 set thread context of 2684 2636 MsDbClient.exe 82 PID 1232 set thread context of 2708 1232 MsDbClient.exe 84 PID 1432 set thread context of 1164 1432 MsDbClient.exe 86 PID 844 set thread context of 1192 844 MsDbClient.exe 88 PID 1620 set thread context of 1764 1620 MsDbClient.exe 90 PID 2412 set thread context of 580 2412 MsDbClient.exe 92 PID 1084 set thread context of 2932 1084 MsDbClient.exe 94 PID 872 set thread context of 1760 872 MsDbClient.exe 96 PID 1800 set thread context of 2484 1800 MsDbClient.exe 98 PID 1972 set thread context of 708 1972 MsDbClient.exe 100 PID 1752 set thread context of 2560 1752 MsDbClient.exe 102 PID 604 set thread context of 2060 604 MsDbClient.exe 104 PID 2736 set thread context of 2808 2736 MsDbClient.exe 106 PID 2628 set thread context of 2660 2628 MsDbClient.exe 108 PID 1932 set thread context of 2632 1932 MsDbClient.exe 110 PID 2836 set thread context of 1524 2836 MsDbClient.exe 112 -
resource yara_rule behavioral1/memory/2548-4-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2548-7-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2548-3-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2548-2-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2548-8-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2548-9-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2548-22-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/832-32-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/832-33-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/832-35-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/832-34-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/832-39-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2756-50-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2756-49-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2756-51-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2756-58-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2496-68-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2496-75-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1028-85-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1028-93-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2844-103-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2844-110-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2076-120-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2076-127-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/688-137-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/688-144-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/896-154-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/896-162-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1444-172-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1444-179-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/888-189-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/888-197-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2368-207-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2368-214-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2748-224-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2748-232-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2732-242-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2732-249-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1856-258-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1856-262-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1656-271-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1656-275-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2040-284-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2040-288-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2440-297-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2440-301-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/444-310-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/444-314-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1004-323-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1004-327-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1624-336-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1624-340-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2184-350-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2184-353-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2096-363-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2096-366-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2116-376-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2116-379-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-388-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-392-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2684-402-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2684-405-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2708-415-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2708-418-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f650f5a24a68da19467a30235be01730_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f650f5a24a68da19467a30235be01730_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2556 wrote to memory of 2548 2556 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 31 PID 2548 wrote to memory of 2060 2548 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 32 PID 2548 wrote to memory of 2060 2548 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 32 PID 2548 wrote to memory of 2060 2548 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 32 PID 2548 wrote to memory of 2060 2548 f650f5a24a68da19467a30235be01730_JaffaCakes118.exe 32 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 2060 wrote to memory of 832 2060 MsDbClient.exe 33 PID 832 wrote to memory of 2472 832 MsDbClient.exe 34 PID 832 wrote to memory of 2472 832 MsDbClient.exe 34 PID 832 wrote to memory of 2472 832 MsDbClient.exe 34 PID 832 wrote to memory of 2472 832 MsDbClient.exe 34 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2472 wrote to memory of 2756 2472 MsDbClient.exe 35 PID 2756 wrote to memory of 1696 2756 MsDbClient.exe 36 PID 2756 wrote to memory of 1696 2756 MsDbClient.exe 36 PID 2756 wrote to memory of 1696 2756 MsDbClient.exe 36 PID 2756 wrote to memory of 1696 2756 MsDbClient.exe 36 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 1696 wrote to memory of 2496 1696 MsDbClient.exe 37 PID 2496 wrote to memory of 2000 2496 MsDbClient.exe 38 PID 2496 wrote to memory of 2000 2496 MsDbClient.exe 38 PID 2496 wrote to memory of 2000 2496 MsDbClient.exe 38 PID 2496 wrote to memory of 2000 2496 MsDbClient.exe 38 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 2000 wrote to memory of 1028 2000 MsDbClient.exe 39 PID 1028 wrote to memory of 1704 1028 MsDbClient.exe 40 PID 1028 wrote to memory of 1704 1028 MsDbClient.exe 40 PID 1028 wrote to memory of 1704 1028 MsDbClient.exe 40 PID 1028 wrote to memory of 1704 1028 MsDbClient.exe 40 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 1704 wrote to memory of 2844 1704 MsDbClient.exe 41 PID 2844 wrote to memory of 2140 2844 MsDbClient.exe 42 PID 2844 wrote to memory of 2140 2844 MsDbClient.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\f650f5a24a68da19467a30235be01730_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f650f5a24a68da19467a30235be01730_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\f650f5a24a68da19467a30235be01730_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f650f5a24a68da19467a30235be01730_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Users\Admin\AppData\Local\Temp\F650F5~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Users\Admin\AppData\Local\Temp\F650F5~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:832 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:304 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:688 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1952 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1920 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:708 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
PID:888 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2532 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2748 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2456 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1656 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2852 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2336 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:952 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1740 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2184 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:332 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:604 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2908 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2636 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1232 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1432 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:844 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1192 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:580 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1084 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:872 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1760 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE69⤵
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:708 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:604 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE74⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
PID:2060 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE75⤵
- Suspicious use of SetThreadContext
PID:2736 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2808 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE77⤵
- Suspicious use of SetThreadContext
PID:2628 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
PID:2660 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1932 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE82⤵
- Maps connected drives based on registry
PID:1524
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5f650f5a24a68da19467a30235be01730
SHA1d4a0a4d034a54061e78750678eb60cb6a073967a
SHA256ee97763a532f7d56560fd36b3a9eb1a76b762cf2f4162b367bf9decc2bd80bd8
SHA5123eb35619b8c52809f4e1dc41dbc04083df4696dd72d1a0a0faa887c3f211d11b4f732394f779da6f94699929ce600e66a140f8f5c2650fad8eaa5ce8a0acbb59