Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/10/2024, 00:44
Static task
static1
Behavioral task
behavioral1
Sample
27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
27edad5f65699a4902be0c87d9689b7a
-
SHA1
555ae912f29ed80c8eb5982870b4402399958e17
-
SHA256
17034b1b9625e8e930663cabfa157c7d97832af640ffaa930314f771c9717800
-
SHA512
99ad5b5d076f545cfbd19da4a13b50f3be1c88dbffbdbddb19fd3bad6114c22d4ae4762d5c6dc37c016cf53a92000196df8ac969e51f331c0afa0daaf8965cf1
-
SSDEEP
24576:qVfyKxj79glUacpyK/2jHFF3D9glUacpyK/2jHFF3:By9k1jlFz9k1jlF
Malware Config
Extracted
darkcomet
camfrog
zerbino85.no-ip.org:1604
DC_MUTEX-0E72WNG
-
InstallPath
APP#\explorer.exe
-
gencode
dRT83mxwn6wq
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
processo di sistema
Extracted
darkcomet
trojan
glauco69.no-ip.org:1604
DC_MUTEX-STJ5WZY
-
InstallPath
APP#\servizi.exe
-
gencode
u1U8EM1x7LCM
-
install
true
-
offline_keylogger
true
-
persistence
false
-
reg_key
MicroUpdate
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP#\\servizi.exe" base camfrog.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP#\\servizi.exe,C:\\Users\\Admin\\AppData\\Roaming\\APP#\\explorer.exe" ESSENZIALE.EXE.SCR -
Modifies firewall policy service 3 TTPs 12 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile servizi.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" servizi.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" servizi.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" explorer.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" explorer.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe -
Modifies security service 2 TTPs 4 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" servizi.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" explorer.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" iexplore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" iexplore.exe -
Drops file in Drivers directory 3 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts base camfrog.exe File opened for modification C:\Windows\system32\drivers\etc\hosts ESSENZIALE.EXE.SCR -
Sets file to hidden 1 TTPs 4 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 3832 attrib.exe 4648 attrib.exe 2204 attrib.exe 1540 attrib.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation base camfrog.exe Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation ESSENZIALE.EXE.SCR -
Executes dropped EXE 4 IoCs
pid Process 2864 base camfrog.exe 5108 ESSENZIALE.EXE.SCR 2980 explorer.exe 940 servizi.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" servizi.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\service.exe" 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\service = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\System\\Services\\service.exe" 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\AppData\\Roaming\\APP#\\servizi.exe" base camfrog.exe Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\processo di sistema = "C:\\Users\\Admin\\AppData\\Roaming\\APP#\\explorer.exe" ESSENZIALE.EXE.SCR -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2980 set thread context of 3488 2980 explorer.exe 103 PID 940 set thread context of 64 940 servizi.exe 107 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 17 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language servizi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language base camfrog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ESSENZIALE.EXE.SCR -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4856 cmd.exe 3244 PING.EXE -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ base camfrog.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 3244 PING.EXE -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 3488 iexplore.exe 64 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe Token: SeIncreaseQuotaPrivilege 2864 base camfrog.exe Token: SeSecurityPrivilege 2864 base camfrog.exe Token: SeTakeOwnershipPrivilege 2864 base camfrog.exe Token: SeLoadDriverPrivilege 2864 base camfrog.exe Token: SeSystemProfilePrivilege 2864 base camfrog.exe Token: SeSystemtimePrivilege 2864 base camfrog.exe Token: SeProfSingleProcessPrivilege 2864 base camfrog.exe Token: SeIncBasePriorityPrivilege 2864 base camfrog.exe Token: SeCreatePagefilePrivilege 2864 base camfrog.exe Token: SeBackupPrivilege 2864 base camfrog.exe Token: SeRestorePrivilege 2864 base camfrog.exe Token: SeShutdownPrivilege 2864 base camfrog.exe Token: SeDebugPrivilege 2864 base camfrog.exe Token: SeSystemEnvironmentPrivilege 2864 base camfrog.exe Token: SeChangeNotifyPrivilege 2864 base camfrog.exe Token: SeRemoteShutdownPrivilege 2864 base camfrog.exe Token: SeUndockPrivilege 2864 base camfrog.exe Token: SeManageVolumePrivilege 2864 base camfrog.exe Token: SeImpersonatePrivilege 2864 base camfrog.exe Token: SeCreateGlobalPrivilege 2864 base camfrog.exe Token: 33 2864 base camfrog.exe Token: 34 2864 base camfrog.exe Token: 35 2864 base camfrog.exe Token: 36 2864 base camfrog.exe Token: SeIncreaseQuotaPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeSecurityPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeTakeOwnershipPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeLoadDriverPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeSystemProfilePrivilege 5108 ESSENZIALE.EXE.SCR Token: SeSystemtimePrivilege 5108 ESSENZIALE.EXE.SCR Token: SeProfSingleProcessPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeIncBasePriorityPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeCreatePagefilePrivilege 5108 ESSENZIALE.EXE.SCR Token: SeBackupPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeRestorePrivilege 5108 ESSENZIALE.EXE.SCR Token: SeShutdownPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeDebugPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeSystemEnvironmentPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeChangeNotifyPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeRemoteShutdownPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeUndockPrivilege 5108 ESSENZIALE.EXE.SCR Token: SeManageVolumePrivilege 5108 ESSENZIALE.EXE.SCR Token: SeImpersonatePrivilege 5108 ESSENZIALE.EXE.SCR Token: SeCreateGlobalPrivilege 5108 ESSENZIALE.EXE.SCR Token: 33 5108 ESSENZIALE.EXE.SCR Token: 34 5108 ESSENZIALE.EXE.SCR Token: 35 5108 ESSENZIALE.EXE.SCR Token: 36 5108 ESSENZIALE.EXE.SCR Token: SeIncreaseQuotaPrivilege 2980 explorer.exe Token: SeSecurityPrivilege 2980 explorer.exe Token: SeTakeOwnershipPrivilege 2980 explorer.exe Token: SeLoadDriverPrivilege 2980 explorer.exe Token: SeSystemProfilePrivilege 2980 explorer.exe Token: SeSystemtimePrivilege 2980 explorer.exe Token: SeProfSingleProcessPrivilege 2980 explorer.exe Token: SeIncBasePriorityPrivilege 2980 explorer.exe Token: SeCreatePagefilePrivilege 2980 explorer.exe Token: SeBackupPrivilege 2980 explorer.exe Token: SeRestorePrivilege 2980 explorer.exe Token: SeShutdownPrivilege 2980 explorer.exe Token: SeDebugPrivilege 2980 explorer.exe Token: SeSystemEnvironmentPrivilege 2980 explorer.exe Token: SeChangeNotifyPrivilege 2980 explorer.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3488 iexplore.exe 64 iexplore.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 4900 wrote to memory of 2864 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 86 PID 4900 wrote to memory of 2864 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 86 PID 4900 wrote to memory of 2864 4900 27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe 86 PID 2864 wrote to memory of 5040 2864 base camfrog.exe 87 PID 2864 wrote to memory of 5040 2864 base camfrog.exe 87 PID 2864 wrote to memory of 5040 2864 base camfrog.exe 87 PID 2864 wrote to memory of 4656 2864 base camfrog.exe 89 PID 2864 wrote to memory of 4656 2864 base camfrog.exe 89 PID 2864 wrote to memory of 4656 2864 base camfrog.exe 89 PID 2864 wrote to memory of 5108 2864 base camfrog.exe 91 PID 2864 wrote to memory of 5108 2864 base camfrog.exe 91 PID 2864 wrote to memory of 5108 2864 base camfrog.exe 91 PID 4656 wrote to memory of 3832 4656 cmd.exe 92 PID 4656 wrote to memory of 3832 4656 cmd.exe 92 PID 4656 wrote to memory of 3832 4656 cmd.exe 92 PID 5040 wrote to memory of 4648 5040 cmd.exe 93 PID 5040 wrote to memory of 4648 5040 cmd.exe 93 PID 5040 wrote to memory of 4648 5040 cmd.exe 93 PID 5108 wrote to memory of 4720 5108 ESSENZIALE.EXE.SCR 94 PID 5108 wrote to memory of 4720 5108 ESSENZIALE.EXE.SCR 94 PID 5108 wrote to memory of 4720 5108 ESSENZIALE.EXE.SCR 94 PID 5108 wrote to memory of 4416 5108 ESSENZIALE.EXE.SCR 96 PID 5108 wrote to memory of 4416 5108 ESSENZIALE.EXE.SCR 96 PID 5108 wrote to memory of 4416 5108 ESSENZIALE.EXE.SCR 96 PID 5108 wrote to memory of 4856 5108 ESSENZIALE.EXE.SCR 98 PID 5108 wrote to memory of 4856 5108 ESSENZIALE.EXE.SCR 98 PID 5108 wrote to memory of 4856 5108 ESSENZIALE.EXE.SCR 98 PID 5108 wrote to memory of 2980 5108 ESSENZIALE.EXE.SCR 100 PID 5108 wrote to memory of 2980 5108 ESSENZIALE.EXE.SCR 100 PID 5108 wrote to memory of 2980 5108 ESSENZIALE.EXE.SCR 100 PID 4720 wrote to memory of 2204 4720 cmd.exe 101 PID 4720 wrote to memory of 2204 4720 cmd.exe 101 PID 4720 wrote to memory of 2204 4720 cmd.exe 101 PID 4416 wrote to memory of 1540 4416 cmd.exe 102 PID 4416 wrote to memory of 1540 4416 cmd.exe 102 PID 4416 wrote to memory of 1540 4416 cmd.exe 102 PID 2980 wrote to memory of 3488 2980 explorer.exe 103 PID 2980 wrote to memory of 3488 2980 explorer.exe 103 PID 2980 wrote to memory of 3488 2980 explorer.exe 103 PID 2980 wrote to memory of 3488 2980 explorer.exe 103 PID 2980 wrote to memory of 3488 2980 explorer.exe 103 PID 4856 wrote to memory of 3244 4856 cmd.exe 104 PID 4856 wrote to memory of 3244 4856 cmd.exe 104 PID 4856 wrote to memory of 3244 4856 cmd.exe 104 PID 2864 wrote to memory of 940 2864 base camfrog.exe 106 PID 2864 wrote to memory of 940 2864 base camfrog.exe 106 PID 2864 wrote to memory of 940 2864 base camfrog.exe 106 PID 940 wrote to memory of 64 940 servizi.exe 107 PID 940 wrote to memory of 64 940 servizi.exe 107 PID 940 wrote to memory of 64 940 servizi.exe 107 PID 940 wrote to memory of 64 940 servizi.exe 107 PID 940 wrote to memory of 64 940 servizi.exe 107 -
System policy modification 1 TTPs 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion servizi.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern servizi.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" servizi.exe -
Views/modifies file attributes 1 TTPs 4 IoCs
pid Process 3832 attrib.exe 4648 attrib.exe 2204 attrib.exe 1540 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27edad5f65699a4902be0c87d9689b7a_JaffaCakes118.exe"1⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\base camfrog.exe"C:\Users\Admin\AppData\Local\Temp\base camfrog.exe"2⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\base camfrog.exe" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\base camfrog.exe" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4648
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4656 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3832
-
-
-
C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR"C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR" /S3⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR" +s +h4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR" +s +h5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h5⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Users\Admin\AppData\Local\Temp\ESSENZIALE.EXE.SCR"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 45⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3244
-
-
-
C:\Users\Admin\AppData\Roaming\APP#\explorer.exe"C:\Users\Admin\AppData\Roaming\APP#\explorer.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"5⤵
- Modifies firewall policy service
- Modifies security service
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:3488
-
-
-
-
C:\Users\Admin\AppData\Roaming\APP#\servizi.exe"C:\Users\Admin\AppData\Roaming\APP#\servizi.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
- System policy modification
PID:940 -
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"4⤵
- Modifies firewall policy service
- Modifies security service
- Windows security bypass
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:64
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Create or Modify System Process
2Windows Service
2Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
3Disable or Modify System Firewall
1Disable or Modify Tools
2Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
650KB
MD56910fcebe9eb59beaa67d09856b19c54
SHA19d4aafb6bcb66a4e4a8200763e0e16d4c535f396
SHA256141089703954f799db1280ff687144385f74786c5ee8dc3a8639d9c961affcd5
SHA512f29ce1dfcb21c379bc2d1edb77aa44e667b34b53470006915381b84ab7593adc2737d425fe4cf44d1b641a8f9081f29f75ec7638a3dfa6d456b5371fc6470c21
-
Filesize
1.3MB
MD5f4e2ebbf66df5a453ec8fb6518df0afa
SHA126ffe9fd7baf0d90bf28200edb5eef3dfd9f57e5
SHA2563b14bd29d3256fe9156dcf8d656c05ecfca0ffe89695f61d478969e21b2c2fc7
SHA512d42ca6ea70ffdbefad9c97172d70e775ab8bea5118c675ba7faf03a78e242f9e1c72a3e3a4e748e01ba42362eb8e004a315d194471b1b75b4dc66adb22526048
-
Filesize
30B
MD5dbea2222c7f5ce4d4a24dadb5fdeda82
SHA1fe2b8d59b373fd84e607f2758b7c91ca130ea728
SHA2565f27e58fea1640fe89561534385f4ecab6862222498befa85ed04823bbb67945
SHA5125f4823866c1620602e9b37e24c9d0d0017dcc1b61b80dc20b5cd98b0a691f2ce326e5f46dda3b48deda608d6f55e1ad1fc1c3a0e13542adaa66772636315ef5b
-
Filesize
31B
MD5216e7e8403372ec2855d7a0527bf32cb
SHA12d798d52f116948493b6524b1784ae6da799b8de
SHA2567ec0c11c5ea6214847bf5b3bd8898e5f42855250207efebe1ec1547350b50633
SHA5121ce682869972a7d476f555ccc4e998e3e22da96df958d67075c684948cea3a609d9cf2c8b6093b28c2b339942462c38d6035cdb19debdf90ff5e3ad733e02413