Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 23:54
Behavioral task
behavioral1
Sample
2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
2757f76e73f89a394adf37eb339e6c70
-
SHA1
4cc4c9df20096da522837e090df80e64acd9d09c
-
SHA256
702cf7fee8a42c80e295d6629f564bae2075f152415fe1c2756c35fa8d71b322
-
SHA512
abc0689984c20c7a8d6922ec9403288630dbb0032b6d0e6613579c48d12038e4ac41df6430db4e5608a1bbb44a1cc24f8b8b982a4fa45c29de373fd1c52c8064
-
SSDEEP
24576:TuqOgwfRJz5LEHyxoR9yLE8QOXXncn5GJMD0QZh9uRcHo8ChYY5nQe:TuqOgYRJzdEH3Senn5WXRcHoD3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\Windupdt\\svchost.exe" 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe -
Checks BIOS information in registry 2 TTPs 6 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchost.exe -
Executes dropped EXE 3 IoCs
pid Process 2596 NOTEPAD.EXE 1496 NOTEPAD.EXE 536 svchost.exe -
Identifies Wine through registry keys 2 TTPs 3 IoCs
Wine is a compatibility layer capable of running Windows applications, which can be used as sandboxing environment.
description ioc Process Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine svchost.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key opened \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Wine explorer.exe -
Loads dropped DLL 4 IoCs
pid Process 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 2960 explorer.exe 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/2624-0-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2624-2-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-45-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-44-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-43-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-50-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-52-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-69-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-67-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-66-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-65-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-64-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-62-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-61-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-60-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-59-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-58-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-57-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-56-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-55-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-54-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-53-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-51-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-49-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-48-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-47-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-68-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-63-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-46-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-70-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-71-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-72-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/files/0x00080000000164b1-80.dat themida behavioral1/memory/2624-89-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2624-86-0x0000000007540000-0x000000000773F000-memory.dmp themida behavioral1/memory/2960-90-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/536-95-0x0000000013140000-0x000000001333F000-memory.dmp themida behavioral1/memory/2960-96-0x0000000013140000-0x000000001333F000-memory.dmp themida -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Windupdt\\svchost.exe" 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Windupdt\\svchost.exe" notepad.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2624 set thread context of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\Windupdt\svchost.exe 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe File opened for modification C:\Windows\Windupdt\ 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe File created C:\Windows\Windupdt\svchost.exe notepad.exe File created C:\Windows\Windupdt\svchost.exe 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeSecurityPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeTakeOwnershipPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeLoadDriverPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeSystemProfilePrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeSystemtimePrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeProfSingleProcessPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeCreatePagefilePrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeBackupPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeRestorePrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeShutdownPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeDebugPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeSystemEnvironmentPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeChangeNotifyPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeRemoteShutdownPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeUndockPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeManageVolumePrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeImpersonatePrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeCreateGlobalPrivilege 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: 33 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: 34 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: 35 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2960 explorer.exe Token: SeSecurityPrivilege 2960 explorer.exe Token: SeTakeOwnershipPrivilege 2960 explorer.exe Token: SeLoadDriverPrivilege 2960 explorer.exe Token: SeSystemProfilePrivilege 2960 explorer.exe Token: SeSystemtimePrivilege 2960 explorer.exe Token: SeProfSingleProcessPrivilege 2960 explorer.exe Token: SeIncBasePriorityPrivilege 2960 explorer.exe Token: SeCreatePagefilePrivilege 2960 explorer.exe Token: SeBackupPrivilege 2960 explorer.exe Token: SeRestorePrivilege 2960 explorer.exe Token: SeShutdownPrivilege 2960 explorer.exe Token: SeDebugPrivilege 2960 explorer.exe Token: SeSystemEnvironmentPrivilege 2960 explorer.exe Token: SeChangeNotifyPrivilege 2960 explorer.exe Token: SeRemoteShutdownPrivilege 2960 explorer.exe Token: SeUndockPrivilege 2960 explorer.exe Token: SeManageVolumePrivilege 2960 explorer.exe Token: SeImpersonatePrivilege 2960 explorer.exe Token: SeCreateGlobalPrivilege 2960 explorer.exe Token: 33 2960 explorer.exe Token: 34 2960 explorer.exe Token: 35 2960 explorer.exe Token: SeIncreaseQuotaPrivilege 536 svchost.exe Token: SeSecurityPrivilege 536 svchost.exe Token: SeTakeOwnershipPrivilege 536 svchost.exe Token: SeLoadDriverPrivilege 536 svchost.exe Token: SeSystemProfilePrivilege 536 svchost.exe Token: SeSystemtimePrivilege 536 svchost.exe Token: SeProfSingleProcessPrivilege 536 svchost.exe Token: SeIncBasePriorityPrivilege 536 svchost.exe Token: SeCreatePagefilePrivilege 536 svchost.exe Token: SeBackupPrivilege 536 svchost.exe Token: SeRestorePrivilege 536 svchost.exe Token: SeShutdownPrivilege 536 svchost.exe Token: SeDebugPrivilege 536 svchost.exe Token: SeSystemEnvironmentPrivilege 536 svchost.exe Token: SeChangeNotifyPrivilege 536 svchost.exe Token: SeRemoteShutdownPrivilege 536 svchost.exe Token: SeUndockPrivilege 536 svchost.exe Token: SeManageVolumePrivilege 536 svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2960 explorer.exe -
Suspicious use of WriteProcessMemory 42 IoCs
description pid Process procid_target PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2880 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 30 PID 2624 wrote to memory of 2596 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2596 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2596 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2596 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 31 PID 2624 wrote to memory of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 PID 2624 wrote to memory of 2960 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 32 PID 2960 wrote to memory of 1496 2960 explorer.exe 33 PID 2960 wrote to memory of 1496 2960 explorer.exe 33 PID 2960 wrote to memory of 1496 2960 explorer.exe 33 PID 2960 wrote to memory of 1496 2960 explorer.exe 33 PID 2624 wrote to memory of 536 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 34 PID 2624 wrote to memory of 536 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 34 PID 2624 wrote to memory of 536 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 34 PID 2624 wrote to memory of 536 2624 2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2757f76e73f89a394adf37eb339e6c70_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\notepad.exenotepad2⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\NOTEPAD.EXE"C:\Users\Admin\AppData\Local\Temp\NOTEPAD.EXE"2⤵
- Executes dropped EXE
PID:2596
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Checks BIOS information in registry
- Identifies Wine through registry keys
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\NOTEPAD.EXE"C:\Users\Admin\AppData\Local\Temp\NOTEPAD.EXE"3⤵
- Executes dropped EXE
PID:1496
-
-
-
C:\Windows\Windupdt\svchost.exe"C:\Windows\Windupdt\svchost.exe"2⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Identifies Wine through registry keys
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:536
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
189KB
MD5f2c7bb8acc97f92e987a2d4087d021b1
SHA17eb0139d2175739b3ccb0d1110067820be6abd29
SHA256142e1d688ef0568370c37187fd9f2351d7ddeda574f8bfa9b0fa4ef42db85aa2
SHA5122f37a2e503cffbd7c05c7d8a125b55368ce11aad5b62f17aaac7aaf3391a6886fa6a0fd73223e9f30072419bf5762a8af7958e805a52d788ba41f61eb084bfe8
-
Filesize
1.4MB
MD52757f76e73f89a394adf37eb339e6c70
SHA14cc4c9df20096da522837e090df80e64acd9d09c
SHA256702cf7fee8a42c80e295d6629f564bae2075f152415fe1c2756c35fa8d71b322
SHA512abc0689984c20c7a8d6922ec9403288630dbb0032b6d0e6613579c48d12038e4ac41df6430db4e5608a1bbb44a1cc24f8b8b982a4fa45c29de373fd1c52c8064