Analysis
-
max time kernel
150s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09/10/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
27edad5f65699a4902be0c87d9689b7a
-
SHA1
555ae912f29ed80c8eb5982870b4402399958e17
-
SHA256
17034b1b9625e8e930663cabfa157c7d97832af640ffaa930314f771c9717800
-
SHA512
99ad5b5d076f545cfbd19da4a13b50f3be1c88dbffbdbddb19fd3bad6114c22d4ae4762d5c6dc37c016cf53a92000196df8ac969e51f331c0afa0daaf8965cf1
-
SSDEEP
24576:qVfyKxj79glUacpyK/2jHFF3D9glUacpyK/2jHFF3:By9k1jlFz9k1jlF
Malware Config
Extracted
darkcomet
trojan
glauco69.no-ip.org:1604
DC_MUTEX-STJ5WZY
-
InstallPath
APP#\servizi.exe
-
gencode
u1U8EM1x7LCM
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Extracted
darkcomet
camfrog
zerbino85.no-ip.org:1604
DC_MUTEX-0E72WNG
-
InstallPath
APP#\explorer.exe
-
gencode
dRT83mxwn6wq
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
processo di sistema
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP#\\servizi.exe" base camfrog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP#\\servizi.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP#\\explorer.exe" ESSENZIALE.EXE.SCR -
Modifies firewall policy service 3 TTPs 9 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" servizi.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile servizi.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" servizi.exe -
Modifies security service 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" servizi.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" servizi.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts base camfrog.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ESSENZIALE.EXE.SCR -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2608 attrib.exe 2644 attrib.exe 1252 attrib.exe 1272 attrib.exe -
Executes dropped EXE 4 IoCs
pid Process 2732 base camfrog.exe 2652 ESSENZIALE.EXE.SCR 3068 explorer.exe 376 servizi.exe -
Loads dropped DLL 8 IoCs
pid Process 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 2732 base camfrog.exe 2732 base camfrog.exe 2652 ESSENZIALE.EXE.SCR 2652 ESSENZIALE.EXE.SCR 2732 base camfrog.exe 2732 base camfrog.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" servizi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\service.exe" 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\service.exe" 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\APP#\\servizi.exe" base camfrog.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Software\Microsoft\Windows\CurrentVersion\Run\processo di sistema = "C:\\Users\\Admin\\AppData\\Roaming\\APP#\\explorer.exe" ESSENZIALE.EXE.SCR -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3068 set thread context of 1532 3068 explorer.exe 48 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language base camfrog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ESSENZIALE.EXE.SCR Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servizi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 1504 cmd.exe 1496 PING.EXE -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1496 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 1532 iexplore.exe 376 servizi.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2732 base camfrog.exe Token: SeSecurityPrivilege 2732 base camfrog.exe Token: SeTakeOwnershipPrivilege 2732 base camfrog.exe Token: SeLoadDriverPrivilege 2732 base camfrog.exe Token: SeSystemProfilePrivilege 2732 base camfrog.exe Token: SeSystemtimePrivilege 2732 base camfrog.exe Token: SeProfSingleProcessPrivilege 2732 base camfrog.exe Token: SeIncBasePriorityPrivilege 2732 base camfrog.exe Token: SeCreatePagefilePrivilege 2732 base camfrog.exe Token: SeBackupPrivilege 2732 base camfrog.exe Token: SeRestorePrivilege 2732 base camfrog.exe Token: SeShutdownPrivilege 2732 base camfrog.exe Token: SeDebugPrivilege 2732 base camfrog.exe Token: SeSystemEnvironmentPrivilege 2732 base camfrog.exe Token: SeChangeNotifyPrivilege 2732 base camfrog.exe Token: SeRemoteShutdownPrivilege 2732 base camfrog.exe Token: SeUndockPrivilege 2732 base camfrog.exe Token: SeManageVolumePrivilege 2732 base camfrog.exe Token: SeImpersonatePrivilege 2732 base camfrog.exe Token: SeCreateGlobalPrivilege 2732 base camfrog.exe Token: 33 2732 base camfrog.exe Token: 34 2732 base camfrog.exe Token: 35 2732 base camfrog.exe Token: SeIncreaseQuotaPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeSecurityPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeTakeOwnershipPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeLoadDriverPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeSystemProfilePrivilege 2652 ESSENZIALE.EXE.SCR Token: SeSystemtimePrivilege 2652 ESSENZIALE.EXE.SCR Token: SeProfSingleProcessPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeIncBasePriorityPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeCreatePagefilePrivilege 2652 ESSENZIALE.EXE.SCR Token: SeBackupPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeRestorePrivilege 2652 ESSENZIALE.EXE.SCR Token: SeShutdownPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeDebugPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeSystemEnvironmentPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeChangeNotifyPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeRemoteShutdownPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeUndockPrivilege 2652 ESSENZIALE.EXE.SCR Token: SeManageVolumePrivilege 2652 ESSENZIALE.EXE.SCR Token: SeImpersonatePrivilege 2652 ESSENZIALE.EXE.SCR Token: SeCreateGlobalPrivilege 2652 ESSENZIALE.EXE.SCR Token: 33 2652 ESSENZIALE.EXE.SCR Token: 34 2652 ESSENZIALE.EXE.SCR Token: 35 2652 ESSENZIALE.EXE.SCR Token: SeIncreaseQuotaPrivilege 3068 explorer.exe Token: SeSecurityPrivilege 3068 explorer.exe Token: SeTakeOwnershipPrivilege 3068 explorer.exe Token: SeLoadDriverPrivilege 3068 explorer.exe Token: SeSystemProfilePrivilege 3068 explorer.exe Token: SeSystemtimePrivilege 3068 explorer.exe Token: SeProfSingleProcessPrivilege 3068 explorer.exe Token: SeIncBasePriorityPrivilege 3068 explorer.exe Token: SeCreatePagefilePrivilege 3068 explorer.exe Token: SeBackupPrivilege 3068 explorer.exe Token: SeRestorePrivilege 3068 explorer.exe Token: SeShutdownPrivilege 3068 explorer.exe Token: SeDebugPrivilege 3068 explorer.exe Token: SeSystemEnvironmentPrivilege 3068 explorer.exe Token: SeChangeNotifyPrivilege 3068 explorer.exe Token: SeRemoteShutdownPrivilege 3068 explorer.exe Token: SeUndockPrivilege 3068 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1532 iexplore.exe 376 servizi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1804 wrote to memory of 2732 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2732 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2732 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 30 PID 1804 wrote to memory of 2732 1804 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 30 PID 2732 wrote to memory of 2716 2732 base camfrog.exe 31 PID 2732 wrote to memory of 2716 2732 base camfrog.exe 31 PID 2732 wrote to memory of 2716 2732 base camfrog.exe 31 PID 2732 wrote to memory of 2716 2732 base camfrog.exe 31 PID 2732 wrote to memory of 2632 2732 base camfrog.exe 33 PID 2732 wrote to memory of 2632 2732 base camfrog.exe 33 PID 2732 wrote to memory of 2632 2732 base camfrog.exe 33 PID 2732 wrote to memory of 2632 2732 base camfrog.exe 33 PID 2716 wrote to memory of 2644 2716 cmd.exe 36 PID 2716 wrote to memory of 2644 2716 cmd.exe 36 PID 2716 wrote to memory of 2644 2716 cmd.exe 36 PID 2716 wrote to memory of 2644 2716 cmd.exe 36 PID 2632 wrote to memory of 2608 2632 cmd.exe 35 PID 2632 wrote to memory of 2608 2632 cmd.exe 35 PID 2632 wrote to memory of 2608 2632 cmd.exe 35 PID 2632 wrote to memory of 2608 2632 cmd.exe 35 PID 2732 wrote to memory of 2652 2732 base camfrog.exe 37 PID 2732 wrote to memory of 2652 2732 base camfrog.exe 37 PID 2732 wrote to memory of 2652 2732 base camfrog.exe 37 PID 2732 wrote to memory of 2652 2732 base camfrog.exe 37 PID 2652 wrote to memory of 1876 2652 ESSENZIALE.EXE.SCR 38 PID 2652 wrote to memory of 1876 2652 ESSENZIALE.EXE.SCR 38 PID 2652 wrote to memory of 1876 2652 ESSENZIALE.EXE.SCR 38 PID 2652 wrote to memory of 1876 2652 ESSENZIALE.EXE.SCR 38 PID 2652 wrote to memory of 1980 2652 ESSENZIALE.EXE.SCR 39 PID 2652 wrote to memory of 1980 2652 ESSENZIALE.EXE.SCR 39 PID 2652 wrote to memory of 1980 2652 ESSENZIALE.EXE.SCR 39 PID 2652 wrote to memory of 1980 2652 ESSENZIALE.EXE.SCR 39 PID 2652 wrote to memory of 1504 2652 ESSENZIALE.EXE.SCR 40 PID 2652 wrote to memory of 1504 2652 ESSENZIALE.EXE.SCR 40 PID 2652 wrote to memory of 1504 2652 ESSENZIALE.EXE.SCR 40 PID 2652 wrote to memory of 1504 2652 ESSENZIALE.EXE.SCR 40 PID 2652 wrote to memory of 3068 2652 ESSENZIALE.EXE.SCR 44 PID 2652 wrote to memory of 3068 2652 ESSENZIALE.EXE.SCR 44 PID 2652 wrote to memory of 3068 2652 ESSENZIALE.EXE.SCR 44 PID 2652 wrote to memory of 3068 2652 ESSENZIALE.EXE.SCR 44 PID 1876 wrote to memory of 1252 1876 cmd.exe 45 PID 1876 wrote to memory of 1252 1876 cmd.exe 45 PID 1876 wrote to memory of 1252 1876 cmd.exe 45 PID 1876 wrote to memory of 1252 1876 cmd.exe 45 PID 1504 wrote to memory of 1496 1504 cmd.exe 46 PID 1504 wrote to memory of 1496 1504 cmd.exe 46 PID 1504 wrote to memory of 1496 1504 cmd.exe 46 PID 1504 wrote to memory of 1496 1504 cmd.exe 46 PID 1980 wrote to memory of 1272 1980 cmd.exe 47 PID 1980 wrote to memory of 1272 1980 cmd.exe 47 PID 1980 wrote to memory of 1272 1980 cmd.exe 47 PID 1980 wrote to memory of 1272 1980 cmd.exe 47 PID 3068 wrote to memory of 1532 3068 explorer.exe 48 PID 3068 wrote to memory of 1532 3068 explorer.exe 48 PID 3068 wrote to memory of 1532 3068 explorer.exe 48 PID 3068 wrote to memory of 1532 3068 explorer.exe 48 PID 3068 wrote to memory of 1532 3068 explorer.exe 48 PID 3068 wrote to memory of 1532 3068 explorer.exe 48 PID 2732 wrote to memory of 376 2732 base camfrog.exe 49 PID 2732 wrote to memory of 376 2732 base camfrog.exe 49 PID 2732 wrote to memory of 376 2732 base camfrog.exe 49 PID 2732 wrote to memory of 376 2732 base camfrog.exe 49 PID 376 wrote to memory of 2892 376 servizi.exe 50 PID 376 wrote to memory of 2892 376 servizi.exe 50 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion servizi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" servizi.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 2608 attrib.exe 2644 attrib.exe 1252 attrib.exe 1272 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\base camfrog.exe"C:\Users\Admin\AppData\Local\Temp\base camfrog.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\base camfrog.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\base camfrog.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2644
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR"C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR" /S3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR" +s +h4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR" +s +h5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1272
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 45⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1496
-
-
-
C:\Users\Admin\AppData\Roaming\APP#\explorer.exe"C:\Users\Admin\AppData\Roaming\APP#\explorer.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
-
-
C:\Users\Admin\AppData\Roaming\APP#\servizi.exe"C:\Users\Admin\AppData\Roaming\APP#\servizi.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:376 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵PID:2892
-
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"4⤵PID:2916
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f4e2ebbf66df5a453ec8fb6518df0afa
SHA126ffe9fd7baf0d90bf28200edb5eef3dfd9f57e5
SHA2563b14bd29d3256fe9156dcf8d656c05ecfca0ffe89695f61d478969e21b2c2fc7
SHA512d42ca6ea70ffdbefad9c97172d70e775ab8bea5118c675ba7faf03a78e242f9e1c72a3e3a4e748e01ba42362eb8e004a315d194471b1b75b4dc66adb22526048
-
Filesize
30B
MD5dbea2222c7f5ce4d4a24dadb5fdeda82
SHA1fe2b8d59b373fd84e607f2758b7c91ca130ea728
SHA2565f27e58fea1640fe89561534385f4ecab6862222498befa85ed04823bbb67945
SHA5125f4823866c1620602e9b37e24c9d0d0017dcc1b61b80dc20b5cd98b0a691f2ce326e5f46dda3b48deda608d6f55e1ad1fc1c3a0e13542adaa66772636315ef5b
-
Filesize
31B
MD5216e7e8403372ec2855d7a0527bf32cb
SHA12d798d52f116948493b6524b1784ae6da799b8de
SHA2567ec0c11c5ea6214847bf5b3bd8898e5f42855250207efebe1ec1547350b50633
SHA5121ce682869972a7d476f555ccc4e998e3e22da96df958d67075c684948cea3a609d9cf2c8b6093b28c2b339942462c38d6035cdb19debdf90ff5e3ad733e02413
-
Filesize
650KB
MD56910fcebe9eb59beaa67d09856b19c54
SHA19d4aafb6bcb66a4e4a8200763e0e16d4c535f396
SHA256141089703954f799db1280ff687144385f74786c5ee8dc3a8639d9c961affcd5
SHA512f29ce1dfcb21c379bc2d1edb77aa44e667b34b53470006915381b84ab7593adc2737d425fe4cf44d1b641a8f9081f29f75ec7638a3dfa6d456b5371fc6470c21