Analysis
-
max time kernel
144s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2024, 01:29
Behavioral task
behavioral1
Sample
0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe
-
Size
356KB
-
MD5
0841f34a47ada771fc3c1df32d57b81e
-
SHA1
96122435ed4b299d214bd7e6d3990bf38cf74034
-
SHA256
a43e0e7c3263e11462bc01fa68f983054aa1b1ad12abb58a1b876326f9aca501
-
SHA512
749acbe5194666f9e5c1cbb24444401a4e1d69ade7fbc86c160eb461feeac229478e5b575e0673e3e1497474fb922c25a15bd9ab5517572c50dff7756ff7ddb4
-
SSDEEP
6144:yYDhB6ActM8FbPt6a15RGkPNJAcb+k2WzoPiML3AYRYAe5mYklPI2XslQP3nIGS+:V9BvctM85t35JPNJj2WzoRLQYRYzmY21
Malware Config
Signatures
-
Executes dropped EXE 23 IoCs
pid Process 2748 mbr_slic_v0621.exe 1480 mbr_slic_v0621.exe 380 mbr_slic_v0621.exe 1088 mbr_slic_v0621.exe 4064 mbr_slic_v0621.exe 4856 mbr_slic_v0621.exe 2296 mbr_slic_v0621.exe 1172 mbr_slic_v0621.exe 4936 mbr_slic_v0621.exe 4456 mbr_slic_v0621.exe 4296 mbr_slic_v0621.exe 2748 mbr_slic_v0621.exe 736 mbr_slic_v0621.exe 1216 mbr_slic_v0621.exe 2892 mbr_slic_v0621.exe 3808 mbr_slic_v0621.exe 2552 mbr_slic_v0621.exe 1040 mbr_slic_v0621.exe 2500 mbr_slic_v0621.exe 4204 mbr_slic_v0621.exe 3636 mbr_slic_v0621.exe 3060 mbr_slic_v0621.exe 4724 mbr_slic_v0621.exe -
AutoIT Executable 14 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3728-12-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-18-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-29-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-40-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-46-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-57-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-68-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-74-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-85-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-91-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-102-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-113-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-119-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe behavioral2/memory/3728-130-0x0000000000400000-0x00000000004C1000-memory.dmp autoit_exe -
resource yara_rule behavioral2/memory/3728-0-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-12-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-18-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-29-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-40-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-46-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-57-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-68-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-74-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-85-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-91-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-102-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-113-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-119-0x0000000000400000-0x00000000004C1000-memory.dmp upx behavioral2/memory/3728-130-0x0000000000400000-0x00000000004C1000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 25 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mbr_slic_v0621.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3728 wrote to memory of 4720 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 83 PID 3728 wrote to memory of 4720 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 83 PID 3728 wrote to memory of 4720 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 83 PID 4720 wrote to memory of 2748 4720 cmd.exe 85 PID 4720 wrote to memory of 2748 4720 cmd.exe 85 PID 4720 wrote to memory of 2748 4720 cmd.exe 85 PID 3728 wrote to memory of 3244 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 91 PID 3728 wrote to memory of 3244 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 91 PID 3728 wrote to memory of 3244 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 91 PID 3244 wrote to memory of 1480 3244 cmd.exe 93 PID 3244 wrote to memory of 1480 3244 cmd.exe 93 PID 3244 wrote to memory of 1480 3244 cmd.exe 93 PID 3728 wrote to memory of 3108 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 96 PID 3728 wrote to memory of 3108 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 96 PID 3728 wrote to memory of 3108 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 96 PID 3108 wrote to memory of 380 3108 cmd.exe 98 PID 3108 wrote to memory of 380 3108 cmd.exe 98 PID 3108 wrote to memory of 380 3108 cmd.exe 98 PID 3728 wrote to memory of 4048 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 99 PID 3728 wrote to memory of 4048 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 99 PID 3728 wrote to memory of 4048 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 99 PID 4048 wrote to memory of 1088 4048 cmd.exe 101 PID 4048 wrote to memory of 1088 4048 cmd.exe 101 PID 4048 wrote to memory of 1088 4048 cmd.exe 101 PID 3728 wrote to memory of 4656 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 104 PID 3728 wrote to memory of 4656 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 104 PID 3728 wrote to memory of 4656 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 104 PID 4656 wrote to memory of 4064 4656 cmd.exe 106 PID 4656 wrote to memory of 4064 4656 cmd.exe 106 PID 4656 wrote to memory of 4064 4656 cmd.exe 106 PID 3728 wrote to memory of 724 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 107 PID 3728 wrote to memory of 724 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 107 PID 3728 wrote to memory of 724 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 107 PID 724 wrote to memory of 4856 724 cmd.exe 109 PID 724 wrote to memory of 4856 724 cmd.exe 109 PID 724 wrote to memory of 4856 724 cmd.exe 109 PID 3728 wrote to memory of 2500 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 110 PID 3728 wrote to memory of 2500 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 110 PID 3728 wrote to memory of 2500 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 110 PID 2500 wrote to memory of 2296 2500 cmd.exe 112 PID 2500 wrote to memory of 2296 2500 cmd.exe 112 PID 2500 wrote to memory of 2296 2500 cmd.exe 112 PID 3728 wrote to memory of 4204 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 113 PID 3728 wrote to memory of 4204 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 113 PID 3728 wrote to memory of 4204 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 113 PID 4204 wrote to memory of 1172 4204 cmd.exe 115 PID 4204 wrote to memory of 1172 4204 cmd.exe 115 PID 4204 wrote to memory of 1172 4204 cmd.exe 115 PID 3728 wrote to memory of 2404 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 116 PID 3728 wrote to memory of 2404 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 116 PID 3728 wrote to memory of 2404 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 116 PID 2404 wrote to memory of 4936 2404 cmd.exe 118 PID 2404 wrote to memory of 4936 2404 cmd.exe 118 PID 2404 wrote to memory of 4936 2404 cmd.exe 118 PID 3728 wrote to memory of 4384 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 119 PID 3728 wrote to memory of 4384 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 119 PID 3728 wrote to memory of 4384 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 119 PID 4384 wrote to memory of 4456 4384 cmd.exe 121 PID 4384 wrote to memory of 4456 4384 cmd.exe 121 PID 4384 wrote to memory of 4456 4384 cmd.exe 121 PID 3728 wrote to memory of 3828 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 122 PID 3728 wrote to memory of 3828 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 122 PID 3728 wrote to memory of 3828 3728 0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe 122 PID 3828 wrote to memory of 4296 3828 cmd.exe 124
Processes
-
C:\Users\Admin\AppData\Local\Temp\0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0841f34a47ada771fc3c1df32d57b81e_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3244 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1480
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:380
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4048 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1088
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4064
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:724 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4856
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1172
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4936
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4384 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4456
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3828 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4296
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2748
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:712 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:736
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1216
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3108 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2892
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:680 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:3808
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2552
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:1040
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:2500
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:3636
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:3060
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /C chdir /d C:\Users\Admin\AppData\Local\Temp&&C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall > msl.log 2>&12⤵
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exeC:\Users\Admin\AppData\Local\Temp\mbr_slic_v0621.exe /uninstall3⤵
- Executes dropped EXE
PID:4724
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD5aab4b0690da35f6f2cd25f213c3d40d7
SHA18b04f8e25843ab812e1d7fd8ee563556cdda6fe6
SHA256ab0c9bc838d09b943fb49defc87ee8fffda570b69b0ac08c524e6ab965bd84f3
SHA51232e30a3300510ab8c390dcb7d5f0654cf781ceb19c4bc8e5d2dd3ab121df58952ded8db2a48b2fa9a037a447d8b363e18605f4f29567a364d135295164ae21b3
-
Filesize
285B
MD544f6e06d470db41408d9037f0a534c5e
SHA1f73c3d749613abac3cdf49d169997d976c5b51e4
SHA2567b78ed07a4ce84454f3cf6ba85031dad762f71b99d83ce7ee02d63530e7e5775
SHA512e56c7271027c350fb64d918adcf0d721fa3c49a3df42dcc060b5b6d8f8b0739e3f57e4975c7cfc505b732b4187b5480b96cf9aeb7f96e7aa7b58cabc63ef88b6