Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/10/2024, 02:28

General

  • Target

    29326712b4014011b32db84af6695ed5_JaffaCakes118.exe

  • Size

    361KB

  • MD5

    29326712b4014011b32db84af6695ed5

  • SHA1

    53cac5fb78c06d438debbb8ea55e043666f213a6

  • SHA256

    e9a1fc7a0c02b600d3694df5708548a385a882c62315fc0130a7d98e17750751

  • SHA512

    52a1a56886cf8820816957d3515f53eb5c36b0b9ee563d232b194f7a932c34b16fd8c32075e1134cd65f4dac4abea59d82ebdb83c6b596f205783ea2ce898d3c

  • SSDEEP

    6144:nflfAsiL4lIJjiJcbI03GBc3ucY5DCSjX:nflfAsiVGjSGecvX

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 44 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Gathers network information 2 TTPs 20 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 37 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: LoadsDriver 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29326712b4014011b32db84af6695ed5_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\29326712b4014011b32db84af6695ed5_JaffaCakes118.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:5008
    • C:\Temp\idbvtnlfdyvqniga.exe
      C:\Temp\idbvtnlfdyvqniga.exe run
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3964
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\tnlfdxvqni.exe ups_run
        3⤵
        • Executes dropped EXE
        • System Location Discovery: System Language Discovery
        PID:396
        • C:\Temp\tnlfdxvqni.exe
          C:\Temp\tnlfdxvqni.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3604
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:1868
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4588
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_tnlfdxvqni.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:376
        • C:\Temp\i_tnlfdxvqni.exe
          C:\Temp\i_tnlfdxvqni.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4156
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\ausnkfcxvp.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:748
        • C:\Temp\ausnkfcxvp.exe
          C:\Temp\ausnkfcxvp.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4104
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2116
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:912
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_ausnkfcxvp.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2700
        • C:\Temp\i_ausnkfcxvp.exe
          C:\Temp\i_ausnkfcxvp.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4852
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\usmkecxupn.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1804
        • C:\Temp\usmkecxupn.exe
          C:\Temp\usmkecxupn.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1916
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:3396
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:608
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_usmkecxupn.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:1828
        • C:\Temp\i_usmkecxupn.exe
          C:\Temp\i_usmkecxupn.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4532
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\xupnhfzxrp.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:2432
        • C:\Temp\xupnhfzxrp.exe
          C:\Temp\xupnhfzxrp.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1356
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2200
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:2424
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_xupnhfzxrp.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4772
        • C:\Temp\i_xupnhfzxrp.exe
          C:\Temp\i_xupnhfzxrp.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4048
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\uomhezxrpj.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:376
        • C:\Temp\uomhezxrpj.exe
          C:\Temp\uomhezxrpj.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:4780
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2280
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:3428
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_uomhezxrpj.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:748
        • C:\Temp\i_uomhezxrpj.exe
          C:\Temp\i_uomhezxrpj.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3788
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\ojhbztrlje.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3588
        • C:\Temp\ojhbztrlje.exe
          C:\Temp\ojhbztrlje.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3300
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4500
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:2824
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_ojhbztrlje.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:3644
        • C:\Temp\i_ojhbztrlje.exe
          C:\Temp\i_ojhbztrlje.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:3396
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\jdbvtolgdy.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1712
        • C:\Temp\jdbvtolgdy.exe
          C:\Temp\jdbvtolgdy.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3660
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:3444
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:1416
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_jdbvtolgdy.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4388
        • C:\Temp\i_jdbvtolgdy.exe
          C:\Temp\i_jdbvtolgdy.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:432
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\ljdbvtolge.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3432
        • C:\Temp\ljdbvtolge.exe
          C:\Temp\ljdbvtolge.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1060
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4872
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:728
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_ljdbvtolge.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4472
        • C:\Temp\i_ljdbvtolge.exe
          C:\Temp\i_ljdbvtolge.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:4772
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\gaysqlidav.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3036
        • C:\Temp\gaysqlidav.exe
          C:\Temp\gaysqlidav.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:3196
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:2800
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4932
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_gaysqlidav.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2328
        • C:\Temp\i_gaysqlidav.exe
          C:\Temp\i_gaysqlidav.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1400
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\aysqkicavs.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1408
        • C:\Temp\aysqkicavs.exe
          C:\Temp\aysqkicavs.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1732
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:4852
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:3664
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_aysqkicavs.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2412
        • C:\Temp\i_aysqkicavs.exe
          C:\Temp\i_aysqkicavs.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2260
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\ausmkfcxup.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:3968
        • C:\Temp\ausmkfcxup.exe
          C:\Temp\ausmkfcxup.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:1464
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:772
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:2996
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_ausmkfcxup.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:4836
        • C:\Temp\i_ausmkfcxup.exe
          C:\Temp\i_ausmkfcxup.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:1288
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\fzxrpkhcau.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:1188
        • C:\Temp\fzxrpkhcau.exe
          C:\Temp\fzxrpkhcau.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2196
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:3408
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:664
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_fzxrpkhcau.exe ups_ins
        3⤵
        • Executes dropped EXE
        PID:2284
        • C:\Temp\i_fzxrpkhcau.exe
          C:\Temp\i_fzxrpkhcau.exe ups_ins
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          • Suspicious use of AdjustPrivilegeToken
          PID:2580
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\cwupmhfzxr.exe ups_run
        3⤵
        • Executes dropped EXE
        PID:4856
        • C:\Temp\cwupmhfzxr.exe
          C:\Temp\cwupmhfzxr.exe ups_run
          4⤵
          • Executes dropped EXE
          • System Location Discovery: System Language Discovery
          PID:2612
          • C:\temp\CreateProcess.exe
            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
            5⤵
            • Executes dropped EXE
            PID:5040
            • C:\windows\system32\ipconfig.exe
              C:\windows\system32\ipconfig.exe /release
              6⤵
              • Gathers network information
              PID:4496
      • C:\temp\CreateProcess.exe
        C:\temp\CreateProcess.exe C:\Temp\i_cwupmhfzxr.exe ups_ins
        3⤵
          PID:3544
          • C:\Temp\i_cwupmhfzxr.exe
            C:\Temp\i_cwupmhfzxr.exe ups_ins
            4⤵
            • System Location Discovery: System Language Discovery
            • Suspicious use of AdjustPrivilegeToken
            PID:2496
        • C:\temp\CreateProcess.exe
          C:\temp\CreateProcess.exe C:\Temp\ztrljebwuo.exe ups_run
          3⤵
            PID:4556
            • C:\Temp\ztrljebwuo.exe
              C:\Temp\ztrljebwuo.exe ups_run
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4456
              • C:\temp\CreateProcess.exe
                C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                5⤵
                  PID:5032
                  • C:\windows\system32\ipconfig.exe
                    C:\windows\system32\ipconfig.exe /release
                    6⤵
                    • Gathers network information
                    PID:872
            • C:\temp\CreateProcess.exe
              C:\temp\CreateProcess.exe C:\Temp\i_ztrljebwuo.exe ups_ins
              3⤵
                PID:4376
                • C:\Temp\i_ztrljebwuo.exe
                  C:\Temp\i_ztrljebwuo.exe ups_ins
                  4⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  PID:1096
              • C:\temp\CreateProcess.exe
                C:\temp\CreateProcess.exe C:\Temp\wtomgeywqo.exe ups_run
                3⤵
                  PID:4268
                  • C:\Temp\wtomgeywqo.exe
                    C:\Temp\wtomgeywqo.exe ups_run
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4368
                    • C:\temp\CreateProcess.exe
                      C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                      5⤵
                        PID:2328
                        • C:\windows\system32\ipconfig.exe
                          C:\windows\system32\ipconfig.exe /release
                          6⤵
                          • Gathers network information
                          PID:640
                  • C:\temp\CreateProcess.exe
                    C:\temp\CreateProcess.exe C:\Temp\i_wtomgeywqo.exe ups_ins
                    3⤵
                      PID:3664
                      • C:\Temp\i_wtomgeywqo.exe
                        C:\Temp\i_wtomgeywqo.exe ups_ins
                        4⤵
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of AdjustPrivilegeToken
                        PID:4852
                    • C:\temp\CreateProcess.exe
                      C:\temp\CreateProcess.exe C:\Temp\bytrljdbvt.exe ups_run
                      3⤵
                        PID:2356
                        • C:\Temp\bytrljdbvt.exe
                          C:\Temp\bytrljdbvt.exe ups_run
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:1564
                          • C:\temp\CreateProcess.exe
                            C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                            5⤵
                              PID:1652
                              • C:\windows\system32\ipconfig.exe
                                C:\windows\system32\ipconfig.exe /release
                                6⤵
                                • Gathers network information
                                PID:2792
                        • C:\temp\CreateProcess.exe
                          C:\temp\CreateProcess.exe C:\Temp\i_bytrljdbvt.exe ups_ins
                          3⤵
                            PID:4436
                            • C:\Temp\i_bytrljdbvt.exe
                              C:\Temp\i_bytrljdbvt.exe ups_ins
                              4⤵
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2996
                          • C:\temp\CreateProcess.exe
                            C:\temp\CreateProcess.exe C:\Temp\bvtnlgdywq.exe ups_run
                            3⤵
                              PID:4444
                              • C:\Temp\bvtnlgdywq.exe
                                C:\Temp\bvtnlgdywq.exe ups_run
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4428
                                • C:\temp\CreateProcess.exe
                                  C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                  5⤵
                                    PID:2492
                                    • C:\windows\system32\ipconfig.exe
                                      C:\windows\system32\ipconfig.exe /release
                                      6⤵
                                      • Gathers network information
                                      PID:2176
                              • C:\temp\CreateProcess.exe
                                C:\temp\CreateProcess.exe C:\Temp\i_bvtnlgdywq.exe ups_ins
                                3⤵
                                  PID:2264
                                  • C:\Temp\i_bvtnlgdywq.exe
                                    C:\Temp\i_bvtnlgdywq.exe ups_ins
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3564
                                • C:\temp\CreateProcess.exe
                                  C:\temp\CreateProcess.exe C:\Temp\ysqkicavsn.exe ups_run
                                  3⤵
                                    PID:5088
                                    • C:\Temp\ysqkicavsn.exe
                                      C:\Temp\ysqkicavsn.exe ups_run
                                      4⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:728
                                      • C:\temp\CreateProcess.exe
                                        C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                        5⤵
                                          PID:1856
                                          • C:\windows\system32\ipconfig.exe
                                            C:\windows\system32\ipconfig.exe /release
                                            6⤵
                                            • Gathers network information
                                            PID:2376
                                    • C:\temp\CreateProcess.exe
                                      C:\temp\CreateProcess.exe C:\Temp\i_ysqkicavsn.exe ups_ins
                                      3⤵
                                        PID:1524
                                        • C:\Temp\i_ysqkicavsn.exe
                                          C:\Temp\i_ysqkicavsn.exe ups_ins
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of AdjustPrivilegeToken
                                          PID:1632
                                      • C:\temp\CreateProcess.exe
                                        C:\temp\CreateProcess.exe C:\Temp\vpnhfaxsqk.exe ups_run
                                        3⤵
                                          PID:3520
                                          • C:\Temp\vpnhfaxsqk.exe
                                            C:\Temp\vpnhfaxsqk.exe ups_run
                                            4⤵
                                            • System Location Discovery: System Language Discovery
                                            PID:3544
                                            • C:\temp\CreateProcess.exe
                                              C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                              5⤵
                                                PID:4616
                                                • C:\windows\system32\ipconfig.exe
                                                  C:\windows\system32\ipconfig.exe /release
                                                  6⤵
                                                  • Gathers network information
                                                  PID:4568
                                          • C:\temp\CreateProcess.exe
                                            C:\temp\CreateProcess.exe C:\Temp\i_vpnhfaxsqk.exe ups_ins
                                            3⤵
                                              PID:4680
                                              • C:\Temp\i_vpnhfaxsqk.exe
                                                C:\Temp\i_vpnhfaxsqk.exe ups_ins
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of AdjustPrivilegeToken
                                                PID:4488
                                            • C:\temp\CreateProcess.exe
                                              C:\temp\CreateProcess.exe C:\Temp\axsqkicaus.exe ups_run
                                              3⤵
                                                PID:2632
                                                • C:\Temp\axsqkicaus.exe
                                                  C:\Temp\axsqkicaus.exe ups_run
                                                  4⤵
                                                  • System Location Discovery: System Language Discovery
                                                  PID:5000
                                                  • C:\temp\CreateProcess.exe
                                                    C:\temp\CreateProcess.exe C:\windows\system32\ipconfig.exe /release
                                                    5⤵
                                                      PID:2192
                                                      • C:\windows\system32\ipconfig.exe
                                                        C:\windows\system32\ipconfig.exe /release
                                                        6⤵
                                                        • Gathers network information
                                                        PID:4620
                                                • C:\temp\CreateProcess.exe
                                                  C:\temp\CreateProcess.exe C:\Temp\i_axsqkicaus.exe ups_ins
                                                  3⤵
                                                    PID:5044
                                                    • C:\Temp\i_axsqkicaus.exe
                                                      C:\Temp\i_axsqkicaus.exe ups_ins
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1400
                                                • C:\Program Files\Internet Explorer\iexplore.exe
                                                  "C:\Program Files\Internet Explorer\iexplore.exe" http://xytets.com:2345/t.asp?os=home
                                                  2⤵
                                                  • Modifies Internet Explorer settings
                                                  • Suspicious use of FindShellTrayWindow
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:3820
                                                  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                                                    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3820 CREDAT:17410 /prefetch:2
                                                    3⤵
                                                    • System Location Discovery: System Language Discovery
                                                    • Modifies Internet Explorer settings
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:3024

                                              Network

                                              MITRE ATT&CK Enterprise v15

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Temp\CreateProcess.exe

                                                Filesize

                                                3KB

                                                MD5

                                                4dbf97cd4b42a5f52c2b420fdafe6fcb

                                                SHA1

                                                759b83a3c0293364bd0d7705df52e0833770c8d9

                                                SHA256

                                                0b044c6c455f56e048e487dc3b07ed5db728bd54c4f1ae1c0f7e12c1dc032c71

                                                SHA512

                                                391a0cb77f19eed259921a6cd5b485984f0ba5c6199dffa61015dee0790560f00953f82cbfd3d2f2540332b29cda44e52b5f8e7b210d6c36f5130d6f73d65438

                                              • C:\Temp\ausnkfcxvp.exe

                                                Filesize

                                                361KB

                                                MD5

                                                83337b6c4e789f3c472c54b4a30e5669

                                                SHA1

                                                13e7d2f4f09650fa1cf5d3ca1d61c363dad4a06b

                                                SHA256

                                                62a4d8dfcdd626ab6f895aaf23faf10640a7962917bd7383bf460696099e9ba8

                                                SHA512

                                                4e444998f536e4d5785be7c4ea31947a75cae615c274e741ba476d6a49161d88a80658e7018c779494d506300da873d91ec4caab3454ad06e611b07ee975564a

                                              • C:\Temp\gaysqlidav.exe

                                                Filesize

                                                361KB

                                                MD5

                                                fe7bd3eb1143b4dabde1f5cd86be3e12

                                                SHA1

                                                44a0496fbf1fddab817573fa06574e5323206b6b

                                                SHA256

                                                ba1ecb5fc6388e1947aaea5cc0746fce66895c3c3bd801188400915df57c0166

                                                SHA512

                                                e0f83b5b33c01e34a8edbe46470df0879f40e9e82430b006399f402f34ff3c2841644353bc6f1841d1e67b7bd6a01be79cdeed3e277cedc93f9a77e68e401005

                                              • C:\Temp\i_ausnkfcxvp.exe

                                                Filesize

                                                361KB

                                                MD5

                                                f8b8dfeba59209111033ff626c27aff5

                                                SHA1

                                                dd50a31c77a8e77db5969177e39b08048371991b

                                                SHA256

                                                5ea44ac65351d3dffa3c2ff2c5f142b5f9d04abdb0a42d39090d4bba9ee99d3e

                                                SHA512

                                                4597e7283ecbff817133a2253c918375219609e44d840ec1e04c62793bc876331084509158abd455719f0158611a5d1c9eeb013714037008e321c6abe002e479

                                              • C:\Temp\i_jdbvtolgdy.exe

                                                Filesize

                                                361KB

                                                MD5

                                                8c524ffefc22d4d21d595571491f376a

                                                SHA1

                                                ee9c9233eb6da79bdee82fea68912b9a5e4ef81d

                                                SHA256

                                                7e2cac8272a6263d98d9bc86fbbaad088bd41f1651b554dab0e6621f14c7b4ae

                                                SHA512

                                                5207727daa491908ac2bfdcc2a2d768591a9f1127738bfc0b30448c33fd2dac495e547808c6983a817d0bff6a797240c563821acf5ed9d652ddcabaa3fddd196

                                              • C:\Temp\i_ljdbvtolge.exe

                                                Filesize

                                                361KB

                                                MD5

                                                998b80d541e2b889446697860e9caaf8

                                                SHA1

                                                a8c080941f02d7784c0712fbd19c43868b94ef84

                                                SHA256

                                                ba3979184675e1b5ad481492ef71f0448060cf21242893b6097c4b7da8d75e56

                                                SHA512

                                                8ad93fc9ea2e716726817095f751146db7be770ebec3935277a59274a8599d7e7352d3d1f2eb056b0a94143d5a3e1a18107c774e2db4031ebdb90a8cee6ab44c

                                              • C:\Temp\i_ojhbztrlje.exe

                                                Filesize

                                                361KB

                                                MD5

                                                7e6bbc7e10487ca1a10e3940d19849a2

                                                SHA1

                                                4a112515d6feb01420ea74fe1dc81d30481285ee

                                                SHA256

                                                5438fd41a76f5a20b75e3ac91732662646f2d3899103f514ec31505635905a5e

                                                SHA512

                                                245a3b88bf8582f863b7423e65a70b00cf09fbcad8f95053fef538cb338673d28a8efd717c733f2b5017957289956feb7b24b87b705aaf5177707303a48130f5

                                              • C:\Temp\i_tnlfdxvqni.exe

                                                Filesize

                                                361KB

                                                MD5

                                                eb9690aac3badb37ead161a44adf51f0

                                                SHA1

                                                0bdaac495a4c51ccc769e7c8d0877c2ce41eb86f

                                                SHA256

                                                d5109025fb5f987da820af54e9b104f77cadecc5bd1c9342114faf82cd13e30c

                                                SHA512

                                                9b0d0600d876687af636ecd621efa3138cd9cb1b36df5cdf323375aea1e69f9e0dd7e72a7692147fb1a23ceda24c50425c700bf1f5bebb459aae6d9f4e532e5c

                                              • C:\Temp\i_uomhezxrpj.exe

                                                Filesize

                                                361KB

                                                MD5

                                                9e8567fbecd1eaf0a237bc8bc631c945

                                                SHA1

                                                6b5d08e5516b77e22aea80cacbf4a4a3d7a2802a

                                                SHA256

                                                672eeddbabd92394ab7a581ea9ce2845b3df5bffcb0d24018808e4a391446231

                                                SHA512

                                                4009ee1d448cd44fe263a5ca149afd0a252177fa9f8b0b49e56fde5c4538a8d2ce8c5b298641ebb2527fad1e524f49b3da97bc1ccbdb15cb51220605edf6808e

                                              • C:\Temp\i_usmkecxupn.exe

                                                Filesize

                                                361KB

                                                MD5

                                                0bfca936a87b4ceaf9afe6b61d1d5566

                                                SHA1

                                                75c4f4a5e1445bc178646524e01ebdf7fdaf3d69

                                                SHA256

                                                4938647850bd8d2dc832f19514d0c952fc91a82769716438e2a689ce1b1f6e21

                                                SHA512

                                                ff062aa64a1c32d7ad2347e0219c4c9a8738e14b64db1b0ad095f1957522e75b9d46c516f5e6e196d94c9a7b78b5ce63ba97f1e5bc47ca6de9d78c01927f59ef

                                              • C:\Temp\i_xupnhfzxrp.exe

                                                Filesize

                                                361KB

                                                MD5

                                                0c4e318defc8a289a3faf2690c5f9268

                                                SHA1

                                                066f8ff785eea4a18b094d7d2a3ad50297d6b88e

                                                SHA256

                                                c93d33f9c05dccab2b50f52235d212c8364d2bf1777b209d2711de9fcbc763c4

                                                SHA512

                                                9dc7323213157a17d10168458fcbd291af9effd86d4bea516d72dfdfd3148a81a5f0c2a3c29ffb06ed06d24b82e75a69cbf3e8061b86bbcd1812e8b43d7ddf58

                                              • C:\Temp\idbvtnlfdyvqniga.exe

                                                Filesize

                                                361KB

                                                MD5

                                                7cdc157a41c677d335728c0eae84a9ae

                                                SHA1

                                                8bea0b76b421420c3f12fa6da3e4fad3d5cdb744

                                                SHA256

                                                3597bb60b3670ecb1373663f2e3e7e8f4e58a916fded87889655984ab820ae1b

                                                SHA512

                                                1e250cc32ef6e94ff1ef092a51f425754853ca895394475081b6c1769608d0f116193824550a83e46537003f8a952aad1c8ddee8fbc8f95074b1a4ab52c14201

                                              • C:\Temp\jdbvtolgdy.exe

                                                Filesize

                                                361KB

                                                MD5

                                                38a972eeb6c85d65579c3e6621f55f42

                                                SHA1

                                                0f96ac9da634924824e653f134d638c4b03df405

                                                SHA256

                                                dae3d39541676c25d51259cf52c1d1c5d5404a219cd99d7d8d5b118ac649855a

                                                SHA512

                                                e0427dc1d2f2eef00c7e43415797823c931e29f17c56e85e7aee8996ddb125d972f5a08b2af0e7a793619cb3b398bd4453c3214d4a53335197fd8ee3df84d2b1

                                              • C:\Temp\ljdbvtolge.exe

                                                Filesize

                                                361KB

                                                MD5

                                                2ac3ab584b25f9b2689132c9754d6956

                                                SHA1

                                                a93a2dadb007d5d73ef61d9462cc5f2aa5b521fa

                                                SHA256

                                                4ba583b283d7729f55fc97aa4ac40a8d5e39e3fd7974ca210c01ec66abf303cf

                                                SHA512

                                                9ae7786704c7d4174efd6061f45e308ada8fdf7c50094fdddd61ac9c1ed6d14bf2dd5ac3c9f80bf995c9d8f3e433e1efe06211184150a5191833a46d6eed0525

                                              • C:\Temp\ojhbztrlje.exe

                                                Filesize

                                                361KB

                                                MD5

                                                8a077b6ee9eb21e4a0c69d828e5f9691

                                                SHA1

                                                31fdd95bda8f3ba4deccca881498a5be0e629b1c

                                                SHA256

                                                1793ebb1da6f5d741f4a4f3792e50768dc8a04bfa2b8a5b33c35aa804af769fc

                                                SHA512

                                                36a5775528fbdca202435c59211ebba71e3a709cf0228cbb50befa4551977db27e1bd9a09fe9b9dd6254b39fedd0d235aad56cd45deb598138ff61098f9435fb

                                              • C:\Temp\tnlfdxvqni.exe

                                                Filesize

                                                361KB

                                                MD5

                                                321fd09fe4c9d98af37bdc754708409f

                                                SHA1

                                                5e62a305c38d6391937f07e0f7847b3270dfa204

                                                SHA256

                                                14780ac77a8027b3c86102c4624376b776b9b975afecd04db7c88b104064cb66

                                                SHA512

                                                9f250cc1b4b14688603937c73d9d73a911d6c7cf3a919f6cd923c35cd126fc0fd0deeaec2c82637b41036860ce191d7e960d5cb2527a30c436626abeafb9dfbf

                                              • C:\Temp\uomhezxrpj.exe

                                                Filesize

                                                361KB

                                                MD5

                                                d48b9629f15eed8e5846a8b1055ad4af

                                                SHA1

                                                6ff3b8ef8af317ccffcb5927d276ce78501e8d94

                                                SHA256

                                                6fca3d6f9a647e0cbf91f9cd8da2b680570a6c03bd367d53f416ea01057a7076

                                                SHA512

                                                8291bbe39ed2823810fdd6ed109ca62b1a34670e337c4feb4617a3dfaaa5ceadcf9d66c631b71f826cdf41a4c1be070ffec0009d6d8cdeaade8c06eb9f830802

                                              • C:\Temp\usmkecxupn.exe

                                                Filesize

                                                361KB

                                                MD5

                                                eed9e949df19aa6bf1d4052e1b4f7887

                                                SHA1

                                                8a5c10a35a49ee871ba9e9efefbd36c92cb98eea

                                                SHA256

                                                003297b8d3aeaa1f8f49bfe4e2677a9b7ce09861cede37b441107ec3f2bfd801

                                                SHA512

                                                f2529f522c606ca3d46ce95d5b539d14d6ddbc8c7b438b19334b65a82b04eeb5c2d7b5c78d5a0f11f6a98d7f63660b04ccc8d7b79a28e8f121cc86feec7b79f6

                                              • C:\Temp\xupnhfzxrp.exe

                                                Filesize

                                                361KB

                                                MD5

                                                1606218951470582d0455300d3f66b05

                                                SHA1

                                                ee80f11a365e7e6174738df59f02150f7b1bbd3b

                                                SHA256

                                                55f10ea64b8f6fe4e3d9ec4949e473c21f69475b74db01bc528179e13c8a67bd

                                                SHA512

                                                69c10753427035402db56a92cdb606298509d0e96e5c15c5724a069d386cd69a634d1589215928dae313916a618f86ad97e944d61660c474ac3532903d059c53

                                              • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\FGDWJGSY\suggestions[1].en-US

                                                Filesize

                                                17KB

                                                MD5

                                                5a34cb996293fde2cb7a4ac89587393a

                                                SHA1

                                                3c96c993500690d1a77873cd62bc639b3a10653f

                                                SHA256

                                                c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                SHA512

                                                e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee