Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
04-10-2024 06:46
Static task
static1
Behavioral task
behavioral1
Sample
1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe
-
Size
48KB
-
MD5
1244a8b289b99327a67adb866ef960a0
-
SHA1
68f13525b9f0b8279baa61942f3fd65b43574715
-
SHA256
141c4f1f46fd81c64e8acecf38a204aba1887ce6a63e5ef478bb85398bc5a2a2
-
SHA512
364f71eac595a7cfe0b883622316534a216cecdd713886b811ca3ed6db4e7f0adebdf2a9b60072d2253af1a84379598593f689761846d8229388f8af0cf6d2e1
-
SSDEEP
768:l6r/0pcM8cJZZD673K383EJBZ4BQTbfqBWV5WV4Pv35BMC0it:8bEcM84g3IEIZ4BQ3fqBWy2X5t
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\KesenjanganSosial.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\KesenjanganSosial.exe\"" lsass.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\KesenjanganSosial.exe\"" inetinfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\KesenjanganSosial.exe\"" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\KesenjanganSosial.exe\"" smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe \"C:\\Windows\\KesenjanganSosial.exe\"" winlogon.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" winlogon.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" inetinfo.exe -
Disables RegEdit via registry modification 12 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "0" winlogon.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" inetinfo.exe -
Disables cmd.exe use via registry modification 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" services.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" lsass.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" inetinfo.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" smss.exe Set value (int) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\DisableCMD = "0" winlogon.exe -
Drops file in Drivers directory 2 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe File opened for modification C:\Windows\System32\drivers\etc\hosts-Denied By-Admin.com inetinfo.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Empty.pif smss.exe -
Executes dropped EXE 5 IoCs
pid Process 2540 smss.exe 2084 winlogon.exe 1816 services.exe 2912 lsass.exe 1936 inetinfo.exe -
Loads dropped DLL 10 IoCs
pid Process 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 2540 smss.exe 2540 smss.exe 2540 smss.exe 2540 smss.exe 2540 smss.exe 2540 smss.exe 2540 smss.exe 2540 smss.exe -
Adds Run key to start application 2 TTPs 18 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\RakyatKelaparan.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\RakyatKelaparan.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus winlogon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\RakyatKelaparan.exe\"" services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\RakyatKelaparan.exe\"" inetinfo.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\RakyatKelaparan.exe\"" 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" smss.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" services.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" inetinfo.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus smss.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Bron-Spizaetus = "\"C:\\Windows\\ShellNew\\RakyatKelaparan.exe\"" winlogon.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus-1464 = "\"C:\\Users\\Admin\\AppData\\Local\\br3951on.exe\"" lsass.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Tok-Cirrhatus inetinfo.exe -
Drops file in System32 directory 15 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msvbvm60.dll 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe File created C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll services.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll lsass.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe inetinfo.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll inetinfo.exe File created C:\Windows\SysWOW64\cmd-brontok.exe 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll winlogon.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe winlogon.exe File opened for modification C:\Windows\SysWOW64\Admin's Setting.scr smss.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe smss.exe File opened for modification C:\Windows\SysWOW64\msvbvm60.dll smss.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe services.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe lsass.exe File opened for modification C:\Windows\SysWOW64\cmd-brontok.exe 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe -
Drops file in Windows directory 14 IoCs
description ioc Process File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe winlogon.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe services.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe File created C:\Windows\KesenjanganSosial.exe 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe inetinfo.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe smss.exe File opened for modification C:\Windows\ShellNew\RakyatKelaparan.exe lsass.exe File opened for modification C:\Windows\KesenjanganSosial.exe inetinfo.exe File created C:\Windows\ShellNew\RakyatKelaparan.exe 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe File opened for modification C:\Windows\KesenjanganSosial.exe 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe File opened for modification C:\Windows\KesenjanganSosial.exe smss.exe File opened for modification C:\Windows\KesenjanganSosial.exe winlogon.exe File opened for modification C:\Windows\KesenjanganSosial.exe services.exe File opened for modification C:\Windows\KesenjanganSosial.exe lsass.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language smss.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language at.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language services.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lsass.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language inetinfo.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 2540 smss.exe 2084 winlogon.exe 1816 services.exe 2912 lsass.exe 1936 inetinfo.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1964 wrote to memory of 2712 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2712 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2712 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2712 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 30 PID 1964 wrote to memory of 2540 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2540 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2540 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 32 PID 1964 wrote to memory of 2540 1964 1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe 32 PID 2540 wrote to memory of 2084 2540 smss.exe 33 PID 2540 wrote to memory of 2084 2540 smss.exe 33 PID 2540 wrote to memory of 2084 2540 smss.exe 33 PID 2540 wrote to memory of 2084 2540 smss.exe 33 PID 2540 wrote to memory of 784 2540 smss.exe 34 PID 2540 wrote to memory of 784 2540 smss.exe 34 PID 2540 wrote to memory of 784 2540 smss.exe 34 PID 2540 wrote to memory of 784 2540 smss.exe 34 PID 2540 wrote to memory of 2940 2540 smss.exe 36 PID 2540 wrote to memory of 2940 2540 smss.exe 36 PID 2540 wrote to memory of 2940 2540 smss.exe 36 PID 2540 wrote to memory of 2940 2540 smss.exe 36 PID 2540 wrote to memory of 1052 2540 smss.exe 38 PID 2540 wrote to memory of 1052 2540 smss.exe 38 PID 2540 wrote to memory of 1052 2540 smss.exe 38 PID 2540 wrote to memory of 1052 2540 smss.exe 38 PID 2540 wrote to memory of 1816 2540 smss.exe 39 PID 2540 wrote to memory of 1816 2540 smss.exe 39 PID 2540 wrote to memory of 1816 2540 smss.exe 39 PID 2540 wrote to memory of 1816 2540 smss.exe 39 PID 2540 wrote to memory of 2912 2540 smss.exe 41 PID 2540 wrote to memory of 2912 2540 smss.exe 41 PID 2540 wrote to memory of 2912 2540 smss.exe 41 PID 2540 wrote to memory of 2912 2540 smss.exe 41 PID 2540 wrote to memory of 1936 2540 smss.exe 42 PID 2540 wrote to memory of 1936 2540 smss.exe 42 PID 2540 wrote to memory of 1936 2540 smss.exe 42 PID 2540 wrote to memory of 1936 2540 smss.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1244a8b289b99327a67adb866ef960a0_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe2⤵
- System Location Discovery: System Language Discovery
PID:2712
-
-
C:\Users\Admin\AppData\Local\smss.exeC:\Users\Admin\AppData\Local\smss.exe2⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\winlogon.exeC:\Users\Admin\AppData\Local\winlogon.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Windows\SysWOW64\at.exeat /delete /y3⤵
- System Location Discovery: System Language Discovery
PID:784
-
-
C:\Windows\SysWOW64\at.exeat 17:08 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"3⤵
- System Location Discovery: System Language Discovery
PID:2940
-
-
C:\Windows\SysWOW64\at.exeat 11:03 /every:M,T,W,Th,F,S,Su "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\6084-NendangBro.com"3⤵
- System Location Discovery: System Language Discovery
PID:1052
-
-
C:\Users\Admin\AppData\Local\services.exeC:\Users\Admin\AppData\Local\services.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Users\Admin\AppData\Local\lsass.exeC:\Users\Admin\AppData\Local\lsass.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
C:\Users\Admin\AppData\Local\inetinfo.exeC:\Users\Admin\AppData\Local\inetinfo.exe3⤵
- Modifies WinLogon for persistence
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Disables RegEdit via registry modification
- Disables cmd.exe use via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1936
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
4Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
48KB
MD51244a8b289b99327a67adb866ef960a0
SHA168f13525b9f0b8279baa61942f3fd65b43574715
SHA256141c4f1f46fd81c64e8acecf38a204aba1887ce6a63e5ef478bb85398bc5a2a2
SHA512364f71eac595a7cfe0b883622316534a216cecdd713886b811ca3ed6db4e7f0adebdf2a9b60072d2253af1a84379598593f689761846d8229388f8af0cf6d2e1