Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-09-2024 06:02
Static task
static1
Behavioral task
behavioral1
Sample
f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
f7b95748be0dcb35fd6e9082c3e758f4
-
SHA1
56056e7b42ce97cfff697bb8c912dab1d700c038
-
SHA256
8223d57e113fdab4003cbdb87d78e399ed84c4b13a65c4790a36cdddc3484b48
-
SHA512
9643c80d871208c0486635e742745399a6b9d30de33777de25e24c29da634e271c5b3bedcaf81e34888e6017afe1a40867bfee198a186a0c8b0d6329a6136f09
-
SSDEEP
24576:pfBc0H7qvHHwvb7YccVlxUioAJje9E7+j+Y/qN5FzFRd2H/zzNt7Y6mQ6QUzGjpn:pf2G79v/xSHzBJ6WC+j2bpW+6Q4GIP
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Modifies security service 2 TTPs 20 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 12 IoCs
pid Process 2692 Rapidshare Auto-Downloader v1.1.exe 2736 MINE.exe 2880 windows_update.exe 1852 windows_update.exe 3020 windows_update.exe 1556 windows_update.exe 1676 windows_update.exe 2528 windows_update.exe 888 windows_update.exe 1472 windows_update.exe 2612 windows_update.exe 2484 windows_update.exe -
Identifies Wine through registry keys 2 TTPs 11 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine MINE.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe Key opened \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Wine windows_update.exe -
Loads dropped DLL 44 IoCs
pid Process 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 2736 MINE.exe 2880 windows_update.exe 2880 windows_update.exe 2880 windows_update.exe 2880 windows_update.exe 1852 windows_update.exe 1852 windows_update.exe 1852 windows_update.exe 1852 windows_update.exe 3020 windows_update.exe 3020 windows_update.exe 3020 windows_update.exe 3020 windows_update.exe 1556 windows_update.exe 1556 windows_update.exe 1556 windows_update.exe 1556 windows_update.exe 1676 windows_update.exe 1676 windows_update.exe 1676 windows_update.exe 1676 windows_update.exe 2528 windows_update.exe 2528 windows_update.exe 2528 windows_update.exe 2528 windows_update.exe 888 windows_update.exe 888 windows_update.exe 888 windows_update.exe 888 windows_update.exe 1472 windows_update.exe 1472 windows_update.exe 1472 windows_update.exe 1472 windows_update.exe 2612 windows_update.exe 2612 windows_update.exe 2612 windows_update.exe 2612 windows_update.exe 2484 windows_update.exe 2484 windows_update.exe 2484 windows_update.exe -
resource yara_rule behavioral1/files/0x0008000000016ca2-14.dat themida behavioral1/memory/2736-148-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2880-147-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2880-159-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2880-161-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2880-167-0x00000000050E0000-0x00000000054B4000-memory.dmp themida behavioral1/memory/1852-173-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2880-170-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1852-291-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1852-294-0x00000000050E0000-0x00000000054B4000-memory.dmp themida behavioral1/memory/1852-301-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/3020-417-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/3020-419-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/3020-435-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1556-544-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1556-545-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1676-552-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1556-553-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1676-670-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1676-671-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1676-792-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2528-794-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2528-800-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/888-916-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/888-929-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1472-1037-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/1472-1151-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2612-1152-0x0000000000400000-0x00000000007D4000-memory.dmp themida behavioral1/memory/2612-1266-0x0000000000400000-0x00000000007D4000-memory.dmp themida -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe MINE.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe MINE.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File created C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe File opened for modification C:\Windows\SysWOW64\windows_update.exe windows_update.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MINE.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows_update.exe -
Runs .reg file with regedit 10 IoCs
pid Process 1324 regedit.exe 2512 regedit.exe 3036 regedit.exe 2368 regedit.exe 2616 regedit.exe 2316 regedit.exe 1696 regedit.exe 748 regedit.exe 2952 regedit.exe 2100 regedit.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 2736 MINE.exe 2880 windows_update.exe 1852 windows_update.exe 3020 windows_update.exe 1556 windows_update.exe 1676 windows_update.exe 2528 windows_update.exe 888 windows_update.exe 1472 windows_update.exe 2612 windows_update.exe 2484 windows_update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2288 wrote to memory of 2692 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2692 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2692 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2692 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 30 PID 2288 wrote to memory of 2736 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2736 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2736 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 31 PID 2288 wrote to memory of 2736 2288 f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe 31 PID 2736 wrote to memory of 2556 2736 MINE.exe 32 PID 2736 wrote to memory of 2556 2736 MINE.exe 32 PID 2736 wrote to memory of 2556 2736 MINE.exe 32 PID 2736 wrote to memory of 2556 2736 MINE.exe 32 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2736 wrote to memory of 2880 2736 MINE.exe 33 PID 2556 wrote to memory of 2368 2556 cmd.exe 34 PID 2556 wrote to memory of 2368 2556 cmd.exe 34 PID 2556 wrote to memory of 2368 2556 cmd.exe 34 PID 2556 wrote to memory of 2368 2556 cmd.exe 34 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 2880 wrote to memory of 1852 2880 windows_update.exe 35 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 1852 wrote to memory of 292 1852 windows_update.exe 36 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 292 wrote to memory of 2616 292 cmd.exe 37 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 1852 wrote to memory of 3020 1852 windows_update.exe 39 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 3020 wrote to memory of 2080 3020 windows_update.exe 40 PID 2080 wrote to memory of 2316 2080 cmd.exe 41 PID 2080 wrote to memory of 2316 2080 cmd.exe 41 PID 2080 wrote to memory of 2316 2080 cmd.exe 41 PID 2080 wrote to memory of 2316 2080 cmd.exe 41 PID 2080 wrote to memory of 2316 2080 cmd.exe 41 PID 2080 wrote to memory of 2316 2080 cmd.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7b95748be0dcb35fd6e9082c3e758f4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Rapidshare Auto-Downloader v1.1.exe"C:\Users\Admin\AppData\Local\Temp\Rapidshare Auto-Downloader v1.1.exe"2⤵
- Executes dropped EXE
PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\MINE.exe"C:\Users\Admin\AppData\Local\Temp\MINE.exe"2⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2368
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 656 "C:\Users\Admin\AppData\Local\Temp\MINE.exe"3⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 772 "C:\Windows\SysWOW64\windows_update.exe"4⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1852 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2616
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 788 "C:\Windows\SysWOW64\windows_update.exe"5⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2316
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 792 "C:\Windows\SysWOW64\windows_update.exe"6⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1556 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1324
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 784 "C:\Windows\SysWOW64\windows_update.exe"7⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1676 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:748
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 800 "C:\Windows\SysWOW64\windows_update.exe"8⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:304 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2952
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 804 "C:\Windows\SysWOW64\windows_update.exe"9⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:888 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵
- System Location Discovery: System Language Discovery
PID:2716 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2512
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 808 "C:\Windows\SysWOW64\windows_update.exe"10⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:1332 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3036
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 812 "C:\Windows\SysWOW64\windows_update.exe"11⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2100
-
-
-
C:\Windows\SysWOW64\windows_update.exeC:\Windows\system32\windows_update.exe 816 "C:\Windows\SysWOW64\windows_update.exe"12⤵
- Executes dropped EXE
- Identifies Wine through registry keys
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2484 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat13⤵
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg14⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1696
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
478B
MD51a00c84e2e8a76c3caa6c0b89f9f0d6d
SHA12650e962d49c5800edb569ee1b989edc8868d9b9
SHA256f477217e9368c8114de7621c41a01818957dae31140ffd7df2b39705c72543e6
SHA512a5f2f271184ff3bad04dd2135e7d32ca32c2ad24400832ec8a143dcbc20449ede4e06b48479ba93609cb1caf0b41a9143698eafb07b032ebdd609e399d62288c
-
Filesize
1KB
MD5584f47a0068747b3295751a0d591f4ee
SHA17886a90e507c56d3a6105ecdfd9ff77939afa56f
SHA256927fd19c24f20ac1dff028de9d73094b2591842248c95a20a8264abf1333aea5
SHA512ca945aad3c2d9ecadff2bc30cf23902b1254cffdf572ff9d4e7c94659255fc3467899053e4a45d3b155900c7b5b91abedf03d31af7e39870015c85e424d04257
-
Filesize
10B
MD5c756b8eac93de58d57105a6c35adb50f
SHA1b18d370dabc3c5b9e82d74f19bbc101a1be009f2
SHA256853448e59c9bb7599fa8a5ff03a0b608781a02d41f58576f1192e0c48cb8d635
SHA51209fbfe4a17b1fb6167c6889e5a0ab41cfef9e1372796e69c2558a50a002d9c1e2b0d81d45d7f96be9d02a8025d0ae276ecc01f135e9ccb04c301adcffd67d263
-
Filesize
76KB
MD59107c5b32cdddbde5f90651e763c0353
SHA1f20da90385e3b6d05daa2f8dcbbd571305315255
SHA25601f36bdf56a2f3a2fd7ad8eb4de378492039c554569080a664ef39dfa0a4354e
SHA5129d2c1e62118395c9f9490daa2fb67cb557b26bfe9dd1a7cf6fecdb0e61f7355116e005b0830cbfaec5144006bd6a63c8963c556dd50dc46ca92898d732171834
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
1.4MB
MD59c0595fe4367e61e2e578ef6fa5e3d0f
SHA199a64947b86b69e2dda873076e18433a63338729
SHA25660591d011a090da281ada86b6b9d505e7faa491ce23304b74f7e243a973d5714
SHA512898712fa3192ccdfbb0346119357bada0839d58d095c18099ac839778b10eb13372618bf0ad0187b4a4526f95a6058bb5bbcd137046bbfb7ef19c60fa0417c85