Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 03:47
Static task
static1
Behavioral task
behavioral1
Sample
fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe
-
Size
88KB
-
MD5
fb70f5e7b30a9d48e67c1ec8759561b2
-
SHA1
2357710d4110e641a972049de0e5ebacb8fcea83
-
SHA256
3554cc872d4429d81b6db460028020c058171eca994cdcdc4e25ff3145f78bf1
-
SHA512
01a303c384d1ad744e3a4ba9dc960ca0d117c613888ac98470e52ee1cce75f5f03b1e7ff7dfb0903a3abde52a4519d5a1f369f973ad0a8e065eb5e8fe90ba2a2
-
SSDEEP
768:NDFIytuRaaq2AOa6TnwVDZ1RO8YSEQJt1H7a8jFk+Zxqfcwl7z:HIUO7YzDZ16SEQJjZx0cwl7z
Malware Config
Signatures
-
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" coaguoj.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe -
Executes dropped EXE 1 IoCs
pid Process 2512 coaguoj.exe -
Adds Run key to start application 2 TTPs 52 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /A" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /x" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /I" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /y" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /m" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /T" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /L" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /E" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /K" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /l" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /w" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /R" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /j" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /X" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /t" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /v" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /W" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /q" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /g" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /H" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /c" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /o" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /i" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /U" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /u" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /C" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /p" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /r" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /z" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /G" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /s" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /n" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /d" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /Z" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /V" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /a" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /h" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /B" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /D" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /e" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /b" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /f" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /P" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /k" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /S" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /F" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /Q" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /M" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /Y" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /J" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /O" coaguoj.exe Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\coaguoj = "C:\\Users\\Admin\\coaguoj.exe /N" coaguoj.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coaguoj.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe 2512 coaguoj.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1180 fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe 2512 coaguoj.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1180 wrote to memory of 2512 1180 fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe 82 PID 1180 wrote to memory of 2512 1180 fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe 82 PID 1180 wrote to memory of 2512 1180 fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe 82 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81 PID 2512 wrote to memory of 1180 2512 coaguoj.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb70f5e7b30a9d48e67c1ec8759561b2_JaffaCakes118.exe"1⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\coaguoj.exe"C:\Users\Admin\coaguoj.exe"2⤵
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512
-
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
88KB
MD5e2914c218fabd85ee708b77fa9856ecd
SHA19b22755614b3fc41d435309c531a719fcc8876cc
SHA256cfe1e037977862147e6cdab308d67faa756a061bb54478b4b7687833e3254c86
SHA512f67ed427dcaaac1a721491e0378116c02e42666c69ea22183d48a33bb42ed3bd34ab5d248e7f4bc98c4a5d1817fab02824f8acaced6af6b05671d0f00be49d33