Analysis
-
max time kernel
145s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 01:29
Behavioral task
behavioral1
Sample
0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe
-
Size
356KB
-
MD5
0841f34a47ada771fc3c1df32d57b81e
-
SHA1
96122435ed4b299d214bd7e6d3990bf38cf74034
-
SHA256
a43e0e7c3263e11462bc01fa68f983054aa1b1ad12abb58a1b876326f9aca501
-
SHA512
749acbe5194666f9e5c1cbb24444401a4e1d69ade7fbc86c160eb461feeac229478e5b575e0673e3e1497474fb922c25a15bd9ab5517572c50dff7756ff7ddb4
-
SSDEEP
6144:yYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYklPI2XslQP3nIGS+:V9BvctM85t35JPNJj2WzoRLQYRYzmY21
Malware Config
Signatures
-
Executes dropped EXE 23 IoCs
pid Process 1848 mbr_slic_v0621.exe 2712 mbr_slic_v0621.exe 2516 mbr_slic_v0621.exe 2676 mbr_slic_v0621.exe 2936 mbr_slic_v0621.exe 2244 mbr_slic_v0621.exe 1840 mbr_slic_v0621.exe 1248 mbr_slic_v0621.exe 1196 mbr_slic_v0621.exe 2548 mbr_slic_v0621.exe 2148 mbr_slic_v0621.exe 1716 mbr_slic_v0621.exe 1524 mbr_slic_v0621.exe 936 mbr_slic_v0621.exe 3048 mbr_slic_v0621.exe 2224 mbr_slic_v0621.exe 1660 mbr_slic_v0621.exe 2052 mbr_slic_v0621.exe 2696 mbr_slic_v0621.exe 2660 mbr_slic_v0621.exe 2640 mbr_slic_v0621.exe 2676 mbr_slic_v0621.exe 2552 mbr_slic_v0621.exe -
Loads dropped DLL 46 IoCs
pid Process 2088 cmd.exe 2088 cmd.exe 2996 cmd.exe 2996 cmd.exe 2780 cmd.exe 2780 cmd.exe 2532 cmd.exe 2532 cmd.exe 2584 cmd.exe 2584 cmd.exe 1120 cmd.exe 1120 cmd.exe 288 cmd.exe 288 cmd.exe 1572 cmd.exe 1572 cmd.exe 1896 cmd.exe 1896 cmd.exe 2608 cmd.exe 2608 cmd.exe 2028 cmd.exe 2028 cmd.exe 2176 cmd.exe 2176 cmd.exe 1784 cmd.exe 1784 cmd.exe 1468 cmd.exe 1468 cmd.exe 1692 cmd.exe 1692 cmd.exe 2268 cmd.exe 2268 cmd.exe 2992 cmd.exe 2992 cmd.exe 2388 cmd.exe 2388 cmd.exe 2744 cmd.exe 2744 cmd.exe 2664 cmd.exe 2664 cmd.exe 3024 cmd.exe 3024 cmd.exe 2964 cmd.exe 2964 cmd.exe 1004 cmd.exe 1004 cmd.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/memory/1960-13-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-21-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-36-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-51-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-59-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-74-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-89-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-97-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-112-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-120-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-131-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-138-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-142-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral1/memory/1960-149-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
resource yara_rule behavioral1/memory/1960-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-13-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-21-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-36-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-51-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-59-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-74-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-89-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-97-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-112-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-120-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-131-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-138-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-142-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral1/memory/1960-149-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2088 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2088 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2088 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 31 PID 1960 wrote to memory of 2088 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 31 PID 2088 wrote to memory of 1848 2088 cmd.exe 33 PID 2088 wrote to memory of 1848 2088 cmd.exe 33 PID 2088 wrote to memory of 1848 2088 cmd.exe 33 PID 2088 wrote to memory of 1848 2088 cmd.exe 33 PID 1960 wrote to memory of 2996 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 34 PID 1960 wrote to memory of 2996 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 34 PID 1960 wrote to memory of 2996 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 34 PID 1960 wrote to memory of 2996 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 34 PID 2996 wrote to memory of 2712 2996 cmd.exe 36 PID 2996 wrote to memory of 2712 2996 cmd.exe 36 PID 2996 wrote to memory of 2712 2996 cmd.exe 36 PID 2996 wrote to memory of 2712 2996 cmd.exe 36 PID 1960 wrote to memory of 2780 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 37 PID 1960 wrote to memory of 2780 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 37 PID 1960 wrote to memory of 2780 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 37 PID 1960 wrote to memory of 2780 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 37 PID 2780 wrote to memory of 2516 2780 cmd.exe 39 PID 2780 wrote to memory of 2516 2780 cmd.exe 39 PID 2780 wrote to memory of 2516 2780 cmd.exe 39 PID 2780 wrote to memory of 2516 2780 cmd.exe 39 PID 1960 wrote to memory of 2532 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 40 PID 1960 wrote to memory of 2532 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 40 PID 1960 wrote to memory of 2532 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 40 PID 1960 wrote to memory of 2532 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 40 PID 2532 wrote to memory of 2676 2532 cmd.exe 42 PID 2532 wrote to memory of 2676 2532 cmd.exe 42 PID 2532 wrote to memory of 2676 2532 cmd.exe 42 PID 2532 wrote to memory of 2676 2532 cmd.exe 42 PID 1960 wrote to memory of 2584 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 43 PID 1960 wrote to memory of 2584 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 43 PID 1960 wrote to memory of 2584 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 43 PID 1960 wrote to memory of 2584 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 43 PID 2584 wrote to memory of 2936 2584 cmd.exe 45 PID 2584 wrote to memory of 2936 2584 cmd.exe 45 PID 2584 wrote to memory of 2936 2584 cmd.exe 45 PID 2584 wrote to memory of 2936 2584 cmd.exe 45 PID 1960 wrote to memory of 1120 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 46 PID 1960 wrote to memory of 1120 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 46 PID 1960 wrote to memory of 1120 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 46 PID 1960 wrote to memory of 1120 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 46 PID 1120 wrote to memory of 2244 1120 cmd.exe 48 PID 1120 wrote to memory of 2244 1120 cmd.exe 48 PID 1120 wrote to memory of 2244 1120 cmd.exe 48 PID 1120 wrote to memory of 2244 1120 cmd.exe 48 PID 1960 wrote to memory of 288 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 49 PID 1960 wrote to memory of 288 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 49 PID 1960 wrote to memory of 288 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 49 PID 1960 wrote to memory of 288 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 49 PID 288 wrote to memory of 1840 288 cmd.exe 51 PID 288 wrote to memory of 1840 288 cmd.exe 51 PID 288 wrote to memory of 1840 288 cmd.exe 51 PID 288 wrote to memory of 1840 288 cmd.exe 51 PID 1960 wrote to memory of 1572 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 52 PID 1960 wrote to memory of 1572 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 52 PID 1960 wrote to memory of 1572 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 52 PID 1960 wrote to memory of 1572 1960 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 52 PID 1572 wrote to memory of 1248 1572 cmd.exe 54 PID 1572 wrote to memory of 1248 1572 cmd.exe 54 PID 1572 wrote to memory of 1248 1572 cmd.exe 54 PID 1572 wrote to memory of 1248 1572 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1848
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2712
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2516
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2244
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:288 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1840
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1248
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1196
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2548
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2148
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1524
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:3048
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2224
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2052
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2696
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2640
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1004 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2552
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
285B
MD544f6e06d470db41408d9037f0a534c5e
SHA1f73c3d749613abac3cdf49d169997d976c5b51e4
SHA2567b78ed07a4ce84454f3cf6ba85031dad762f71b99d83ce7ee02d63530e7e5775
SHA512e56c7271027c350fb64d918adcf0d721fa3c49a3df42dcc060b5b6d8f8b0739e3f57e4975c7cfc505b732b4187b5480b96cf9aeb7f96e7aa7b58cabc63ef88b6
-
Filesize
57KB
MD5aab4b0690da35f6f2cd25f213c3d40d7
SHA18b04f8e25843ab812e1d7fd8ee563556cdda6fe6
SHA256ab0c9bc838d09b943fb49defc87ee8fffda570b69b0ac08c524e6ab965bd84f3
SHA51232e30a3300510ab8c390dcb7d5f0654cf781ceb19c4bc8e5d2dd3ab121df58952ded8db2a48b2fa9a037a447d8b363e18605f4f29567a364d135295164ae21b3