Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 23:33
Static task
static1
Behavioral task
behavioral1
Sample
27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe
-
Size
4.1MB
-
MD5
27180e35d87903bead456c3709faf4e1
-
SHA1
87309208ca8e199516a1b812dc19eabdeb12762c
-
SHA256
dcac44fe5358086b1559c215e07604aff1c01de85e2261fedfd36933fc73b33a
-
SHA512
073a4c72aeba8f5e8a83e14128c47bd1595bb2da289e06da8686b50392e31f45e7fd4122282f98e7511e933851d519c2407676c56551483b60896eb3d2317cdf
-
SSDEEP
49152:CErsedPJLa3CnHxUMUErsedPJLa3CnHxBZHv:CEAedPJGiUMUEAedPJGiBtv
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\btaj.exe -dwup" btaj.exe -
Executes dropped EXE 48 IoCs
pid Process 2648 btaj.exe 3592 btaj.exe 1088 btaj.exe 2124 btaj.exe 3024 btaj.exe 3164 btaj.exe 3148 btaj.exe 2616 btaj.exe 2704 btaj.exe 2912 btaj.exe 624 btaj.exe 1404 btaj.exe 3668 btaj.exe 4932 btaj.exe 1916 btaj.exe 812 btaj.exe 532 btaj.exe 4348 btaj.exe 4436 btaj.exe 3776 btaj.exe 4376 btaj.exe 4468 btaj.exe 1132 btaj.exe 2156 btaj.exe 4820 btaj.exe 2788 btaj.exe 1188 btaj.exe 5020 btaj.exe 1780 btaj.exe 3064 btaj.exe 4660 btaj.exe 3736 btaj.exe 4448 btaj.exe 4136 btaj.exe 3416 btaj.exe 3880 btaj.exe 4476 btaj.exe 4672 btaj.exe 4760 btaj.exe 548 btaj.exe 1572 btaj.exe 4668 btaj.exe 384 btaj.exe 2408 btaj.exe 2008 btaj.exe 2460 btaj.exe 3108 btaj.exe 4068 btaj.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x000e000000023a7a-8.dat autoit_exe -
Suspicious use of SetThreadContext 24 IoCs
description pid Process procid_target PID 4352 set thread context of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 2648 set thread context of 3592 2648 btaj.exe 88 PID 2124 set thread context of 3024 2124 btaj.exe 91 PID 3164 set thread context of 3148 3164 btaj.exe 93 PID 2616 set thread context of 2704 2616 btaj.exe 96 PID 2912 set thread context of 624 2912 btaj.exe 100 PID 1404 set thread context of 3668 1404 btaj.exe 102 PID 4932 set thread context of 1916 4932 btaj.exe 104 PID 812 set thread context of 532 812 btaj.exe 106 PID 4348 set thread context of 4436 4348 btaj.exe 108 PID 3776 set thread context of 4376 3776 btaj.exe 110 PID 4468 set thread context of 1132 4468 btaj.exe 112 PID 2156 set thread context of 4820 2156 btaj.exe 114 PID 2788 set thread context of 1188 2788 btaj.exe 116 PID 5020 set thread context of 1780 5020 btaj.exe 118 PID 3064 set thread context of 4660 3064 btaj.exe 120 PID 3736 set thread context of 4448 3736 btaj.exe 122 PID 4136 set thread context of 3416 4136 btaj.exe 124 PID 3880 set thread context of 4476 3880 btaj.exe 126 PID 4672 set thread context of 4760 4672 btaj.exe 128 PID 548 set thread context of 1572 548 btaj.exe 130 PID 4668 set thread context of 384 4668 btaj.exe 132 PID 2408 set thread context of 2008 2408 btaj.exe 134 PID 2460 set thread context of 3108 2460 btaj.exe 136 -
System Location Discovery: System Language Discovery 1 TTPs 27 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language btaj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 4352 wrote to memory of 1680 4352 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 86 PID 1680 wrote to memory of 2648 1680 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 87 PID 1680 wrote to memory of 2648 1680 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 87 PID 1680 wrote to memory of 2648 1680 27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe 87 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 2648 wrote to memory of 3592 2648 btaj.exe 88 PID 3592 wrote to memory of 1088 3592 btaj.exe 89 PID 3592 wrote to memory of 1088 3592 btaj.exe 89 PID 3592 wrote to memory of 1088 3592 btaj.exe 89 PID 3592 wrote to memory of 1088 3592 btaj.exe 89 PID 3592 wrote to memory of 1088 3592 btaj.exe 89 PID 1088 wrote to memory of 2124 1088 btaj.exe 90 PID 1088 wrote to memory of 2124 1088 btaj.exe 90 PID 1088 wrote to memory of 2124 1088 btaj.exe 90 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 2124 wrote to memory of 3024 2124 btaj.exe 91 PID 1088 wrote to memory of 3164 1088 btaj.exe 92 PID 1088 wrote to memory of 3164 1088 btaj.exe 92 PID 1088 wrote to memory of 3164 1088 btaj.exe 92 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 3164 wrote to memory of 3148 3164 btaj.exe 93 PID 1088 wrote to memory of 2616 1088 btaj.exe 94 PID 1088 wrote to memory of 2616 1088 btaj.exe 94 PID 1088 wrote to memory of 2616 1088 btaj.exe 94 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 2616 wrote to memory of 2704 2616 btaj.exe 96 PID 1088 wrote to memory of 2912 1088 btaj.exe 99 PID 1088 wrote to memory of 2912 1088 btaj.exe 99 PID 1088 wrote to memory of 2912 1088 btaj.exe 99 PID 2912 wrote to memory of 624 2912 btaj.exe 100 PID 2912 wrote to memory of 624 2912 btaj.exe 100 PID 2912 wrote to memory of 624 2912 btaj.exe 100 PID 2912 wrote to memory of 624 2912 btaj.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4352 -
C:\Users\Admin\AppData\Local\Temp\27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Local\Temp\27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe -dwup3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Local\Temp\27180e35d87903bead456c3709faf4e1_JaffaCakes118.exe -dwup4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:3024
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:3148
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:2704
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:624
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1404 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:3668
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4932 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:1916
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:812 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:532
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4348 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4436
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3776 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4376
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4468 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:1132
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2156 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4820
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:1188
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:1780
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3064 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4660
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3736 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4448
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4136 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:3416
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4476
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4672 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:4760
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:548 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:1572
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:384
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2408 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:2008
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe7⤵
- Executes dropped EXE
PID:3108
-
-
-
C:\Users\Admin\AppData\Roaming\btaj.exeC:\Users\Admin\AppData\Roaming\btaj.exe6⤵
- Executes dropped EXE
PID:4068
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.1MB
MD527180e35d87903bead456c3709faf4e1
SHA187309208ca8e199516a1b812dc19eabdeb12762c
SHA256dcac44fe5358086b1559c215e07604aff1c01de85e2261fedfd36933fc73b33a
SHA512073a4c72aeba8f5e8a83e14128c47bd1595bb2da289e06da8686b50392e31f45e7fd4122282f98e7511e933851d519c2407676c56551483b60896eb3d2317cdf