Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
11-10-2024 02:59
Static task
static1
Behavioral task
behavioral1
Sample
3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe
-
Size
7.4MB
-
MD5
3302c0ea3da62f2eca1a8a13ddd22971
-
SHA1
b4124d13ea819822246972a973402c3ce4d5be35
-
SHA256
551d738e35f8c014d31e4f89edddb73ea085b04ea63c10c8ff34a79ef6110b54
-
SHA512
5416dc46f1ac17668f03840b5e89a8b3631f5c05b02cfd5c18501a2182047cedc6f375e4409c386d1e7f7fb46724861893050c9745934115a05e3036f3e93d36
-
SSDEEP
196608:ClAsCR/ZphLadEn/12We1FFkpqvmOCQom7xOJl:ClAL1FRn/7e1ahDQo+c
Malware Config
Signatures
-
Executes dropped EXE 18 IoCs
Processes:
[email protected]rutserv.exerutservSrv.exeDesktopLayer.exerutserv.exerutservSrv.exeDesktopLayer.exerutserv.exerutservSrv.exeDesktopLayer.exerutserv.exerutservSrv.exeDesktopLayer.exerfusclient.exerfusclient.exerfusclientSrv.exeDesktopLayer.exerfusclient.exepid process 2228 [email protected] 1532 rutserv.exe 1808 rutservSrv.exe 948 DesktopLayer.exe 1076 rutserv.exe 1716 rutservSrv.exe 1456 DesktopLayer.exe 2208 rutserv.exe 2732 rutservSrv.exe 2752 DesktopLayer.exe 2392 rutserv.exe 1924 rutservSrv.exe 316 DesktopLayer.exe 2008 rfusclient.exe 908 rfusclient.exe 1656 rfusclientSrv.exe 236 DesktopLayer.exe 2524 rfusclient.exe -
Loads dropped DLL 31 IoCs
Processes:
3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exeMsiExec.exerutserv.exerutservSrv.exerutserv.exerutservSrv.exerutserv.exerutservSrv.exerutserv.exerutservSrv.exerfusclient.exerfusclient.exerfusclientSrv.exerfusclient.exepid process 2412 3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe 2348 MsiExec.exe 1532 rutserv.exe 1532 rutserv.exe 1532 rutserv.exe 1808 rutservSrv.exe 1808 rutservSrv.exe 1076 rutserv.exe 1076 rutserv.exe 1076 rutserv.exe 1716 rutservSrv.exe 1716 rutservSrv.exe 2208 rutserv.exe 2208 rutserv.exe 2208 rutserv.exe 2732 rutservSrv.exe 2732 rutservSrv.exe 2392 rutserv.exe 2392 rutserv.exe 2392 rutserv.exe 1924 rutservSrv.exe 1924 rutservSrv.exe 2392 rutserv.exe 2392 rutserv.exe 2008 rfusclient.exe 908 rfusclient.exe 908 rfusclient.exe 908 rfusclient.exe 1656 rfusclientSrv.exe 1656 rfusclientSrv.exe 2524 rfusclient.exe -
Blocklisted process makes network request 4 IoCs
Processes:
msiexec.exeflow pid process 3 2756 msiexec.exe 5 2756 msiexec.exe 7 2756 msiexec.exe 9 2756 msiexec.exe -
Drops desktop.ini file(s) 1 IoCs
Processes:
iexplore.exedescription ioc process File opened for modification C:\Users\Admin\Favorites\Links\desktop.ini iexplore.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
msiexec.exedescription ioc process File opened (read-only) \??\O: msiexec.exe File opened (read-only) \??\P: msiexec.exe File opened (read-only) \??\U: msiexec.exe File opened (read-only) \??\B: msiexec.exe File opened (read-only) \??\G: msiexec.exe File opened (read-only) \??\Q: msiexec.exe File opened (read-only) \??\R: msiexec.exe File opened (read-only) \??\T: msiexec.exe File opened (read-only) \??\E: msiexec.exe File opened (read-only) \??\H: msiexec.exe File opened (read-only) \??\K: msiexec.exe File opened (read-only) \??\S: msiexec.exe File opened (read-only) \??\V: msiexec.exe File opened (read-only) \??\W: msiexec.exe File opened (read-only) \??\X: msiexec.exe File opened (read-only) \??\Y: msiexec.exe File opened (read-only) \??\A: msiexec.exe File opened (read-only) \??\J: msiexec.exe File opened (read-only) \??\L: msiexec.exe File opened (read-only) \??\M: msiexec.exe File opened (read-only) \??\N: msiexec.exe File opened (read-only) \??\Z: msiexec.exe File opened (read-only) \??\I: msiexec.exe -
Drops file in System32 directory 39 IoCs
Processes:
iexplore.exeiexplore.exeIEXPLORE.EXEdescription ioc process File opened for modification C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\PrivacIE\Low iexplore.exe File created C:\Windows\system32\config\systemprofile\Favorites\Links\Suggested Sites.url iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\msapplication.xml iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357 iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IECompatUACache\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\TabRoaming iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\IECompatCache\Low iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\ieonline.microsoft[1] iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\Cookies\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~ iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~\WebSlices~\Suggested Sites~.feed-ms iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Internet Explorer\UserData\Low iexplore.exe File opened for modification C:\Windows\System32\config\systemprofile\Favorites\Links iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\FeedsStore.feedsdb-ms iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 iexplore.exe File opened for modification C:\Windows\System32\config\systemprofile\Favorites\Links\desktop.ini iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD832851-877C-11EF-833B-EE9D5ADBD8E3}.dat iexplore.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat IEXPLORE.EXE File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\{5588ACFD-6436-411B-A5CE-666AE6A92D3D}~ iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Feeds\FeedsStore.feedsdb-ms iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Virtualized iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Tiles\pin-2845162440\msapplication.xml iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\History\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\Favorites\desktop.ini iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Roaming\Microsoft\Windows\DNTException\Low iexplore.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\{CD832853-877C-11EF-833B-EE9D5ADBD8E3}.dat iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357 iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD832851-877C-11EF-833B-EE9D5ADBD8E3}.dat iexplore.exe File opened for modification C:\Windows\system32\config\systemprofile\Favorites iexplore.exe -
Processes:
resource yara_rule behavioral1/memory/1808-181-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1808-194-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/948-202-0x0000000000400000-0x0000000000413000-memory.dmp upx behavioral1/memory/1656-345-0x0000000000400000-0x0000000000413000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
Processes:
attrib.exemsiexec.exeattrib.exerutserv.exerutservSrv.exerutservSrv.exerutserv.exerutservSrv.execmd.exerfusclientSrv.exeattrib.exedescription ioc process File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\install.cmd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\msvcp90.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rmsui.dll msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rmsui2.exe attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\progress.exe msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe rutserv.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rmsui.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\SampleClient.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\setupdrv.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rmspm.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\pxE714.tmp rutservSrv.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rutservSrv.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\RWLN.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrv_rms.dll msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\msvcr90.dll msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe rutserv.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\dsfVorbisDecoder.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\vp8encoder.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\DesktopLayer.exe rutservSrv.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\fwproc.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rms.gpd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll cmd.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\srvinst.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms.gpd msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\rfusclientSrv.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrvui_rms.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\stdnames_vpd.gpd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\progress.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64 attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\gdiplus.dll msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\dsfVorbisDecoder.dll msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\setupdrv.exe msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\EULA.rtf attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\msvcr90.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unires_vpd.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\VPDAgent_x64.exe msiexec.exe File created C:\Program Files (x86)\Microsoft\DesktopLayer.exe rutservSrv.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rms.ini attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unires_vpd.dll msiexec.exe File opened for modification C:\Program Files (x86)\Microsoft\pxEC04.tmp rfusclientSrv.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\English.lg msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms.lng msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\rms.ini msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\unidrvui_rms.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\fwproc.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\srvinst.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\stdnames_vpd.gpd attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\rms_s.lng attrib.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\winmm.dll cmd.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\progress.exe msiexec.exe File created C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\ntprint.inf msiexec.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\unidrvui_rms.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\dsfVorbisEncoder.dll attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x86\progress.exe attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Microsoft.VC90.CRT.manifest attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\ntprint.inf attrib.exe File opened for modification C:\Program Files (x86)\Remote Manipulator System - Host\Printer\x64\uninstall.cmd attrib.exe -
Drops file in Windows directory 19 IoCs
Processes:
msiexec.execmd.exedescription ioc process File created C:\Windows\Installer\f76df89.ipi msiexec.exe File created C:\Windows\Installer\f76df8b.msi msiexec.exe File opened for modification C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\ARPPRODUCTICON.exe msiexec.exe File created C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exe msiexec.exe File opened for modification C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exe msiexec.exe File opened for modification C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_start_C00864331B9D4391A8A26292A601EBE2.exe msiexec.exe File created C:\Windows\28122008.txt cmd.exe File opened for modification C:\Windows\Installer\MSIE53C.tmp msiexec.exe File created C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\ARPPRODUCTICON.exe msiexec.exe File opened for modification C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_stop_27D7873393984316BEA10FB36BB4D2F9.exe msiexec.exe File created C:\Windows\Installer\f76df86.msi msiexec.exe File opened for modification C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe msiexec.exe File created C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_config_C8E9A92497A149D695F92E4E3AE550F0.exe msiexec.exe File created C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_start_C00864331B9D4391A8A26292A601EBE2.exe msiexec.exe File opened for modification C:\Windows\Installer\f76df89.ipi msiexec.exe File created C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\UNINST_Uninstall_R_3B1E3C8B7D0945898DA82CEEED02F0C7.exe msiexec.exe File opened for modification C:\Windows\Installer\MSIE309.tmp msiexec.exe File opened for modification C:\Windows\Installer\ msiexec.exe File opened for modification C:\Windows\Installer\f76df86.msi msiexec.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 36 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DesktopLayer.exerfusclient.exeattrib.exe3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe[email protected]cmd.exerutserv.exeDesktopLayer.exeregedit.exeattrib.exerutserv.exerutserv.exerutservSrv.exeMsiExec.exeDesktopLayer.exerfusclientSrv.exeDesktopLayer.exemsiexec.exerfusclient.exePING.EXErutservSrv.exeIEXPLORE.EXEIEXPLORE.EXEmsiexec.exemsiexec.exeDesktopLayer.exeIEXPLORE.EXEIEXPLORE.EXEattrib.exerutserv.exerfusclient.exeattrib.exePING.EXErutservSrv.exeIEXPLORE.EXErutservSrv.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [email protected] Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutservSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsiExec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclientSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutservSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DesktopLayer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutserv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rfusclient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutservSrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rutservSrv.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 2 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
PING.EXEPING.EXEpid process 2844 PING.EXE 1712 PING.EXE -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "434777427" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{CDCA9191-877C-11EF-833B-EE9D5ADBD8E3} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Modifies data under HKEY_USERS 64 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeIEXPLORE.EXEmsiexec.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEdescription ioc process Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Type = "3" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\Certificates iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\Main\OperationalData = "4" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\SmartCardRoot\CTLs iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Settings\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\Flags = "512" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021494-0000-0000-C000-000000000046} iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Count = "3" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E msiexec.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021493-0000-0000-C000-000000000046}\Enum IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021494-0000-0000-C000-000000000046}\Enum IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Type = "3" iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\Disallowed\CRLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\AppDataLow\Software\Microsoft\RepService iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\trust\CRLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\F12 iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\BrowserEmulation\TLDUpdates = "0" iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories\{00021493-0000-0000-C000-000000000046}\Enum\Implementing = 1c00000001000000e8070a0005000b0002003b0014005e0302000000e11a542af65b6546a8a3cfa9672e4291644ea2ef78b0d01189e400c04fc9e26e IEXPLORE.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Suggested Sites iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Type = "3" iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore\Count = "4" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\Root\Certificates iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\trust\Certificates iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{00021494-0000-0000-C000-000000000046}\Enum iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2e\52C64B7E iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\MenuOrder\Favorites iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\SystemCertificates\CA\CRLs iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6AA09F7B-20C5-4EE9-A009-3BE64FDBA2A2}\WpadNetworkName = "Network 3" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup IEXPLORE.EXE Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" iexplore.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Classes\Local Settings\MuiCache\2E\52C64B7E\@ieframe.dll,-12512 = "Bing" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\06-b2-77-50-b4-cf\WpadDecisionReason = "1" iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{6AA09F7B-20C5-4EE9-A009-3BE64FDBA2A2}\06-b2-77-50-b4-cf iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Policies\Microsoft\SystemCertificates\CA\CTLs iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{72853161-30C5-4D22-B7F9-0BBC1D38A37E}\iexplore iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Ext\Stats\{18DF081C-E8AD-4283-A596-FA578C2EBDC3}\iexplore\Count = "3" iexplore.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\KnownProvidersUpgradeTime = b092cb92891bdb01 iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup iexplore.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Ext iexplore.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\AppDataLow\Software iexplore.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" iexplore.exe -
Modifies registry class 44 IoCs
Processes:
regedit.exemsiexec.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Net regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\Language = "1049" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\Media msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\AdvertiseFlags = "388" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\PackageCode = "CA621BAB2625C4F47B0824566FC192D8" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Language = "1049" regedit.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Clients = 3a0000000000 regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F21BB3D03099A4D40A267949D7A24BE4\RMS msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\Version = "100603766" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\InstanceType = "0" msiexec.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\Clients = 3a0000000000 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\LastUsedSource = "n;1;C:\\Users\\Admin\\AppData\\Local\\Temp\\7ZipSfx.000\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\ProductName regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17\F21BB3D03099A4D40A267949D7A24BE4 msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\Net msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Assignment = "1" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\InstanceType = "0" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\DeploymentFlags = "3" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media\1 = "DISK1;1" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Net\1 = "C:\\Users\\836D~1\\AppData\\Local\\Temp\\7ZipSfx.003\\" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\PackageCode = "001E4BCEB6F30B0418BA0CB49940D551" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\AdvertiseFlags = "388" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\ProductIcon = "C:\\Windows\\Installer\\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\\ARPPRODUCTICON.exe" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\Net\1 = "C:\\Users\\Admin\\AppData\\Local\\Temp\\7ZipSfx.000\\" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\Media\DiskPrompt = "[1]" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\LastUsedSource = "n;1;C:\\Users\\836D~1\\AppData\\Local\\Temp\\7ZipSfx.003\\" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2 regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\Version = "100603060" regedit.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Features\F21BB3D03099A4D40A267949D7A24BE4 msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\Assignment = "1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\DeploymentFlags = "3" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\ProductName = "Remote Manipulator System - Host" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\PackageName = "rms.host5.6ru.msi" msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\SourceList\Media\1 = "DISK1;1" msiexec.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\AuthorizedLUAApp = "0" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\PackageName = "rms.host5.5ru.msi" regedit.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\SourceList\Media\DiskPrompt = "[1]" regedit.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\F21BB3D03099A4D40A267949D7A24BE4\AuthorizedLUAApp = "0" msiexec.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\509B38EF4554FFD4794F292971C81B17 msiexec.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Installer\Products\E629DA2CCD54F5C4880A36EA6E3A62A2\ProductIcon = "C:\\Windows\\Installer\\{C2AD926E-45DC-4C5F-88A0-63AEE6A3262A}\\ARPPRODUCTICON.exe" regedit.exe -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid process 1212 regedit.exe -
Runs ping.exe 1 TTPs 2 IoCs
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
Processes:
msiexec.exerutserv.exeDesktopLayer.exerutserv.exeDesktopLayer.exeDesktopLayer.exerutserv.exeDesktopLayer.exerutserv.exerfusclient.exeDesktopLayer.exepid process 2756 msiexec.exe 2756 msiexec.exe 1532 rutserv.exe 1532 rutserv.exe 1532 rutserv.exe 1532 rutserv.exe 948 DesktopLayer.exe 948 DesktopLayer.exe 948 DesktopLayer.exe 948 DesktopLayer.exe 1076 rutserv.exe 1076 rutserv.exe 1456 DesktopLayer.exe 1456 DesktopLayer.exe 1456 DesktopLayer.exe 1456 DesktopLayer.exe 2752 DesktopLayer.exe 2752 DesktopLayer.exe 2752 DesktopLayer.exe 2752 DesktopLayer.exe 2208 rutserv.exe 2208 rutserv.exe 316 DesktopLayer.exe 316 DesktopLayer.exe 316 DesktopLayer.exe 316 DesktopLayer.exe 2392 rutserv.exe 2392 rutserv.exe 2392 rutserv.exe 2392 rutserv.exe 2008 rfusclient.exe 236 DesktopLayer.exe 236 DesktopLayer.exe 236 DesktopLayer.exe 236 DesktopLayer.exe -
Suspicious behavior: SetClipboardViewer 1 IoCs
Processes:
rfusclient.exepid process 2524 rfusclient.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
msiexec.exemsiexec.exemsiexec.exedescription pid process Token: SeShutdownPrivilege 2864 msiexec.exe Token: SeIncreaseQuotaPrivilege 2864 msiexec.exe Token: SeRestorePrivilege 2756 msiexec.exe Token: SeTakeOwnershipPrivilege 2756 msiexec.exe Token: SeSecurityPrivilege 2756 msiexec.exe Token: SeCreateTokenPrivilege 2864 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2864 msiexec.exe Token: SeLockMemoryPrivilege 2864 msiexec.exe Token: SeIncreaseQuotaPrivilege 2864 msiexec.exe Token: SeMachineAccountPrivilege 2864 msiexec.exe Token: SeTcbPrivilege 2864 msiexec.exe Token: SeSecurityPrivilege 2864 msiexec.exe Token: SeTakeOwnershipPrivilege 2864 msiexec.exe Token: SeLoadDriverPrivilege 2864 msiexec.exe Token: SeSystemProfilePrivilege 2864 msiexec.exe Token: SeSystemtimePrivilege 2864 msiexec.exe Token: SeProfSingleProcessPrivilege 2864 msiexec.exe Token: SeIncBasePriorityPrivilege 2864 msiexec.exe Token: SeCreatePagefilePrivilege 2864 msiexec.exe Token: SeCreatePermanentPrivilege 2864 msiexec.exe Token: SeBackupPrivilege 2864 msiexec.exe Token: SeRestorePrivilege 2864 msiexec.exe Token: SeShutdownPrivilege 2864 msiexec.exe Token: SeDebugPrivilege 2864 msiexec.exe Token: SeAuditPrivilege 2864 msiexec.exe Token: SeSystemEnvironmentPrivilege 2864 msiexec.exe Token: SeChangeNotifyPrivilege 2864 msiexec.exe Token: SeRemoteShutdownPrivilege 2864 msiexec.exe Token: SeUndockPrivilege 2864 msiexec.exe Token: SeSyncAgentPrivilege 2864 msiexec.exe Token: SeEnableDelegationPrivilege 2864 msiexec.exe Token: SeManageVolumePrivilege 2864 msiexec.exe Token: SeImpersonatePrivilege 2864 msiexec.exe Token: SeCreateGlobalPrivilege 2864 msiexec.exe Token: SeShutdownPrivilege 2776 msiexec.exe Token: SeIncreaseQuotaPrivilege 2776 msiexec.exe Token: SeCreateTokenPrivilege 2776 msiexec.exe Token: SeAssignPrimaryTokenPrivilege 2776 msiexec.exe Token: SeLockMemoryPrivilege 2776 msiexec.exe Token: SeIncreaseQuotaPrivilege 2776 msiexec.exe Token: SeMachineAccountPrivilege 2776 msiexec.exe Token: SeTcbPrivilege 2776 msiexec.exe Token: SeSecurityPrivilege 2776 msiexec.exe Token: SeTakeOwnershipPrivilege 2776 msiexec.exe Token: SeLoadDriverPrivilege 2776 msiexec.exe Token: SeSystemProfilePrivilege 2776 msiexec.exe Token: SeSystemtimePrivilege 2776 msiexec.exe Token: SeProfSingleProcessPrivilege 2776 msiexec.exe Token: SeIncBasePriorityPrivilege 2776 msiexec.exe Token: SeCreatePagefilePrivilege 2776 msiexec.exe Token: SeCreatePermanentPrivilege 2776 msiexec.exe Token: SeBackupPrivilege 2776 msiexec.exe Token: SeRestorePrivilege 2776 msiexec.exe Token: SeShutdownPrivilege 2776 msiexec.exe Token: SeDebugPrivilege 2776 msiexec.exe Token: SeAuditPrivilege 2776 msiexec.exe Token: SeSystemEnvironmentPrivilege 2776 msiexec.exe Token: SeChangeNotifyPrivilege 2776 msiexec.exe Token: SeRemoteShutdownPrivilege 2776 msiexec.exe Token: SeUndockPrivilege 2776 msiexec.exe Token: SeSyncAgentPrivilege 2776 msiexec.exe Token: SeEnableDelegationPrivilege 2776 msiexec.exe Token: SeManageVolumePrivilege 2776 msiexec.exe Token: SeImpersonatePrivilege 2776 msiexec.exe -
Suspicious use of FindShellTrayWindow 12 IoCs
Processes:
iexplore.exeiexplore.exeiexplore.exeiexplore.exeiexplore.exepid process 2252 iexplore.exe 2084 iexplore.exe 2004 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 3012 iexplore.exe 1456 iexplore.exe -
Suspicious use of SetWindowsHookEx 22 IoCs
Processes:
iexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEiexplore.exeIEXPLORE.EXEpid process 2252 iexplore.exe 2252 iexplore.exe 2292 IEXPLORE.EXE 2292 IEXPLORE.EXE 2084 iexplore.exe 2084 iexplore.exe 2704 IEXPLORE.EXE 2704 IEXPLORE.EXE 2004 iexplore.exe 2004 iexplore.exe 1980 IEXPLORE.EXE 1980 IEXPLORE.EXE 3012 iexplore.exe 3012 iexplore.exe 2012 IEXPLORE.EXE 2012 IEXPLORE.EXE 1456 iexplore.exe 1456 iexplore.exe 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE 2652 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 10 IoCs
Processes:
rutservSrv.exeDesktopLayer.exerutservSrv.exeDesktopLayer.exerutservSrv.exeDesktopLayer.exerutservSrv.exeDesktopLayer.exerfusclientSrv.exeDesktopLayer.exepid process 1808 rutservSrv.exe 948 DesktopLayer.exe 1716 rutservSrv.exe 1456 DesktopLayer.exe 2732 rutservSrv.exe 2752 DesktopLayer.exe 1924 rutservSrv.exe 316 DesktopLayer.exe 1656 rfusclientSrv.exe 236 DesktopLayer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe[email protected]cmd.exemsiexec.exerutserv.exerutservSrv.exeDesktopLayer.exeiexplore.exedescription pid process target process PID 2412 wrote to memory of 2228 2412 3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe [email protected] PID 2412 wrote to memory of 2228 2412 3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe [email protected] PID 2412 wrote to memory of 2228 2412 3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe [email protected] PID 2412 wrote to memory of 2228 2412 3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe [email protected] PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2228 wrote to memory of 2560 2228 [email protected] cmd.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2864 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2776 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2844 2560 cmd.exe PING.EXE PID 2560 wrote to memory of 2844 2560 cmd.exe PING.EXE PID 2560 wrote to memory of 2844 2560 cmd.exe PING.EXE PID 2560 wrote to memory of 2844 2560 cmd.exe PING.EXE PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2560 wrote to memory of 2612 2560 cmd.exe msiexec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 2348 2756 msiexec.exe MsiExec.exe PID 2756 wrote to memory of 1532 2756 msiexec.exe rutserv.exe PID 2756 wrote to memory of 1532 2756 msiexec.exe rutserv.exe PID 2756 wrote to memory of 1532 2756 msiexec.exe rutserv.exe PID 2756 wrote to memory of 1532 2756 msiexec.exe rutserv.exe PID 1532 wrote to memory of 1808 1532 rutserv.exe rutservSrv.exe PID 1532 wrote to memory of 1808 1532 rutserv.exe rutservSrv.exe PID 1532 wrote to memory of 1808 1532 rutserv.exe rutservSrv.exe PID 1532 wrote to memory of 1808 1532 rutserv.exe rutservSrv.exe PID 1808 wrote to memory of 948 1808 rutservSrv.exe DesktopLayer.exe PID 1808 wrote to memory of 948 1808 rutservSrv.exe DesktopLayer.exe PID 1808 wrote to memory of 948 1808 rutservSrv.exe DesktopLayer.exe PID 1808 wrote to memory of 948 1808 rutservSrv.exe DesktopLayer.exe PID 948 wrote to memory of 2252 948 DesktopLayer.exe iexplore.exe PID 948 wrote to memory of 2252 948 DesktopLayer.exe iexplore.exe PID 948 wrote to memory of 2252 948 DesktopLayer.exe iexplore.exe PID 948 wrote to memory of 2252 948 DesktopLayer.exe iexplore.exe PID 2252 wrote to memory of 2524 2252 iexplore.exe ie4uinit.exe PID 2252 wrote to memory of 2524 2252 iexplore.exe ie4uinit.exe PID 2252 wrote to memory of 2524 2252 iexplore.exe ie4uinit.exe PID 2756 wrote to memory of 1076 2756 msiexec.exe rutserv.exe PID 2756 wrote to memory of 1076 2756 msiexec.exe rutserv.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
-
Uses Volume Shadow Copy WMI provider
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Uses Volume Shadow Copy service COM API
The Volume Shadow Copy service is used to manage backups/snapshots.
-
Views/modifies file attributes 1 TTPs 4 IoCs
Processes:
attrib.exeattrib.exeattrib.exeattrib.exepid process 1920 attrib.exe 2400 attrib.exe 1820 attrib.exe 2796 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3302c0ea3da62f2eca1a8a13ddd22971_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\[email protected]"C:\Users\Admin\AppData\Local\Temp\[email protected]"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2228 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\7ZipSfx.000\install.cmd" "3⤵
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\msiexec.exeMsiExec /x {61FFA475-24D5-44FB-A51F-39B699E3D82C} /qn REBOOT=ReallySuppress4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
C:\Windows\SysWOW64\msiexec.exeMsiExec /x {54067864-C0E7-47DB-A0C1-D6C874CE6BD8} /qn REBOOT=ReallySuppress4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2776
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2844
-
-
C:\Windows\SysWOW64\msiexec.exeMsiExec /I "rms.host5.6ru.msi" /qn4⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1712
-
-
C:\Windows\SysWOW64\regedit.exeregedit /s 28.reg4⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Runs .reg file with regedit
PID:1212
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r "C:\Program Files (x86)\Remote Manipulator System - Host"4⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1920
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r "C:\Program Files (x86)\Remote Manipulator System - Host"4⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2400
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r /d /s "C:\Program Files (x86)\Remote Manipulator System - Host\*.*"4⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1820
-
-
C:\Windows\SysWOW64\attrib.exeattrib +h +s +r /d /s "C:\Program Files (x86)\Remote Manipulator System - Host\*.*"4⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2796
-
-
-
-
C:\Windows\system32\msiexec.exeC:\Windows\system32\msiexec.exe /V1⤵
- Blocklisted process makes network request
- Enumerates connected drives
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\syswow64\MsiExec.exeC:\Windows\syswow64\MsiExec.exe -Embedding ADC0E15CC451A40FDC2400DEA76EDF382⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2348
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /silentinstall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Drops desktop.ini file(s)
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2252 -
C:\Windows\System32\ie4uinit.exe"C:\Windows\System32\ie4uinit.exe" -ShowQLIcon6⤵PID:2524
-
-
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2252 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2292
-
-
-
-
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /firewall2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1076 -
C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1716 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:1456 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2084 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2704
-
-
-
-
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe" /start2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:2732 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:2752 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2004 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
-
-
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutserv.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rutservSrv.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1924 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:316 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Drops file in System32 directory
- Modifies data under HKEY_USERS
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:3012 CREDAT:275457 /prefetch:25⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: SetClipboardViewer
PID:2524
-
-
-
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclient.exe" /tray2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:908 -
C:\Program Files (x86)\Remote Manipulator System - Host\rfusclientSrv.exe"C:\Program Files (x86)\Remote Manipulator System - Host\rfusclientSrv.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
PID:1656 -
C:\Program Files (x86)\Microsoft\DesktopLayer.exe"C:\Program Files (x86)\Microsoft\DesktopLayer.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of UnmapMainImage
PID:236 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1456 CREDAT:275457 /prefetch:26⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2652
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Defense Evasion
Hide Artifacts
1Hidden Files and Directories
1Modify Registry
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5ba3b5ccade836c6f305479e850d051ef
SHA1610085c9570c9fa76d58cfa32a48ed41f90deea6
SHA25673ba180947bb94c37bfe6c43c25665e05bcd4581fea8e9d233016948da7ff542
SHA512dab5e14e0438bd71b3fa8a802ef691b88a102c33ea5a33231347a0bfcbf5d29b3fe99d035bdbcbc2b357b6f951335abf1d9326fccdbcdedd7e200a465f3c5c7e
-
Filesize
43KB
MD5fcccdb05b62796ad70eec5b21069114a
SHA1e9aeb1bb63ed3c23e15c033049a9a645f6e2f1fa
SHA256e4e1e61c81fe036cd05c2ed1a362e1f20565cf6df29fd714b7ad145e1b5176ce
SHA512a187ee14092dabe948944bd9c451364cb48a08bdff044756f1281d7fba3398a926bb5260b66422dad78d2557791d3187a8e9f76d11a8f5382886393adb987cc8
-
Filesize
144KB
MD5941d1b63a94549cbe5224a4e722dd4d5
SHA1bab121f4c3528af35456bac20fbd296112624260
SHA256ce1cd24a782932e1c28c030da741a21729a3c5930d8358079b0f91747dd0d832
SHA512b6bf11fa34ceab70e3f3ce48a8a6dcbe5cfa859db4a03ca18cc6309773a32aff9db111d2d2ab5bb1ce974322eaf71ea81cfaa3911d6b8085a82823a0aa1d30ee
-
Filesize
957KB
MD5897266223a905afdc1225ff4e621c868
SHA16a5130154430284997dc76af8b145ab90b562110
SHA256be991f825a2e6939f776ebc6d80d512a33cbbe60de2fcc32820c64f1d6b13c07
SHA5121ad1386e71e036e66f3b6fdece5a376e7309ceb0f6eb73c3a8203b0825c45aa1f74e1f722b508cf3f73456e7d808853d37bcef79bfe8476fc16a4e6af2e9202b
-
Filesize
48KB
MD550716fb95abf80ff78451e8a33f16d3c
SHA125552c03bf9ab4eb475ba9880a25acd09d44c4f5
SHA256c36482a3a77859c8c7856da7c1360cfb6b84112df08c50cb3ec176546fa3fa1c
SHA512071c131826e1d76b79e1dfbf5f1934d4ad5c49cbd904b13e7b11706fc3dd16db281d8ca32f49d08a3640ce59caec2a74597534607701606a7dc52ddf424742e2
-
Filesize
240KB
MD550bad879226bcbbf02d5cf2dcbcfbf61
SHA1be262f40212bd5a227d19fdbbd4580c200c31e4b
SHA25649295f414c5405a4f180b319cfed471871471776e4853baaf117a5185ec0d90d
SHA512476df817a9c9e23423080afcac899b83fc8f532e4fe62bea2feeb988cba538f1f710e2fb61d81d6c283c428d772922c7a6ecb1684ac68ca8f267415105a60116
-
Filesize
1.6MB
MD52721aa44e21659358e8a25c0f13ce02b
SHA191589226e6fd81675e013c5b7aad06e5f7903e61
SHA25674ca24097bc69145af11dc6a0580665d4766aa78c7633f4084d16d7b4fecc5fb
SHA512fb1f06e18b369e5df0dedf20bf5bcaae4f6d93bf8a4789db2d05b7c895fdeff2dc086089cca67fa7d352563b491606a547c37959db623b071e90a1c876d6cc2a
-
Filesize
1.6MB
MD57916c52814b561215c01795bb71bb884
SHA10b3341642559efc8233561f81ec80a3983b9fc2d
SHA2567d3c4c52684afff597dc4c132c464b651cb94aad039458b674d69cf76c240e64
SHA512fc0a1d717c636639be6835d93bdde8019799842e11a055bedeb468f57cfaabf5582a65e1770841486550e06b1b9ba020ff5fad14b7838fe70afefb37933f1a8f
-
Filesize
556KB
MD599c5cb416cb1f25f24a83623ed6a6a09
SHA10dbf63dea76be72390c0397cb047a83914e0f7c8
SHA2569f47416ca37a864a31d3dc997677f8739433f294e83d0621c48eb9093c2e4515
SHA5128bd1b14a690aa15c07ead90edacbcc4e8e3f68e0bfd6191d42519b9542786df35a66ed37e7af9cf9ff14d55a5622c29a88fee2a5bde889740a3ce6160d5256ac
-
Filesize
638KB
MD5bfeac23ced1f4ac8254b5cd1a2bf4dda
SHA1fd450e3bc758d984f68f0ae5963809d7d80645b6
SHA256420d298de132941eacec6718039a5f42eaec498399c482e2e0ff4dad76a09608
SHA5121f4afc2eb72f51b9e600fbbf0d4408728e29b0c6ca45801605801ead0a287873ebbfaaae10b027f1a287c82232d1e7a3a7e7435b7f6a39223c3f7b23d96ed272
-
Filesize
4.8MB
MD58ae7c08d0c3805092e59cd384da8b618
SHA1d1e443a5226621e7d2ca48660d68985933ff8659
SHA25603cccc0222706488a7da919bb6298067ba5e9ef854ecf8d1dc45ffadd392841c
SHA5121b96509721d9606d1c6c00c385ee5136218ea683c038a666fc903cf13d26874b3ccd1891f627f65e765a74a5987d40ea6725fbf87e954a812638edfb59b3f1f7
-
Filesize
5.8MB
MD5ae0f362b2afc356560b498e665289dc2
SHA1c4adc720f015715ea17fee1935ade4af2fb503ab
SHA25657ae1d78909fede3aa45037bfb5402204c13b162d85f553448f2767bb8ceb397
SHA5128c96b1fa69e4d5e6776bee99c1a66f66ab91a9c5c06008587000b3666df83c4cb54400f39908ff344b19159bd48d44c0078717d7e13eb825bd58587a23295699
-
Filesize
409KB
MD51525887bc6978c0b54fec544877319e6
SHA17820fcd66e6fbf717d78a2a4df5b0367923dc431
SHA256a47431090c357c00b27a3327d9d591088bc84b60060751ea6454cb3f1ae23e69
SHA51256cb35ef2d5a52ba5cf4769a6bad4a4bae292bceff1b8aff5125046d43aff7683282a14bc8b626d7dccc250e0ed57b1ae54dd105732573089359444f774d6153
-
Filesize
691KB
MD5c8fd8c4bc131d59606b08920b2fda91c
SHA1df777e7c6c1b3d84a8277e6a669e9a5f7c15896d
SHA2566f5ddf4113e92bf798e9ecf0fc0350ee7cae7c5479ca495e3045bdb313efd240
SHA5122fe25325a94cd0f8af30f96ef03c4e64b1a721f603f792d9da72dcd4a5c92081bb24d90da5394f47e54d9d23e9c7ee845cbf469ea8371c088bda787c54b9369d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD5112c20428c094f5b26b1a9a048d61707
SHA1cacb70374309a4c39d195ee9f79733a6394847af
SHA25682cf2c0136d8b92ac25e4f8f8cc12c28542aeae92612c05c3383bd2150067db8
SHA5126f72a64ae39dbb2f70a1d682111ba293f8c0f2dbab6eb472c39a5247b12cc7c07d2f5cf32a3bf79807ba625a1d7e2a0f8684d2603868bc9012e27690c032b3ed
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD543d49d4eb34eaf3ed6c5c969f163c4b0
SHA123c035a5139a783d4df731ba6f3ea6a38992a2d1
SHA2566cf73740dd493a17781f177ec918577af4a6b5416d0b7cf7e0e249ea9f228b07
SHA5128ab54d292584879060ce8e3d174f2947a4bb36db731bfd9f793f54c13dc59eadc7144a20741272af9d33457321b78eb9df3f863555f8ac8f056da3407bd01ea6
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f78707e0cbae123f54a8e33db1a8d50b
SHA153cc3c5bb9ca22f6b179cbf640934abe27fbd381
SHA25653d49831e8f61c460ae3492c698f9f86211618dec339f1e94442425905e962f9
SHA51243f93df825679bc1eb8b71837b1d6de540738395e52774f60c39793709c1f5a802d777432ad8b21966b955938d4083b2de1624ea935e536b5a07df5b8ad4382c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d8b0fef0d4cf66c073248ff43e01d8fb
SHA1df4a03466b7d6ca8d115d29657309630a4ff3ac0
SHA256eeb4175fe05649d71ca219b4892bcef1994b3148b5e90620ac18f4404b1125bd
SHA512d3c9cc284729ce03581b2c3703a27f344dc860bfb37c61c5dc8f0da923210ef843aae177eeac8f23b656362cbc2cf6712ade10d39030caf57756b88f86c164d9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1beb567c7094b73fb32a3f1c2d6546
SHA1345c7d4440222ebe29eb1585b2c5b28c7076feb8
SHA25635124d12b84732c73a3f910ab8c4864a6447958fb0f7f237954a1f1c355250ff
SHA512070da7384df28c9c598e3a8c313654fcb20301f7fba2169b708cc146266584dd11e8f988415f3e704ce14df3646fe26c265be7b680f7efca6f99aad7bb63f3e2
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD549d8d244dc35b761fd9cb5adc5bc2543
SHA183e025e2d8a83dc71b3fa271f2ca1962c2c5f140
SHA256d938ad14b9fedaf832c09b5855c4319d0b03049b9c19ee4ea7dea118b36f6bf9
SHA512a495cec4b29e189ff6ab7061c080e17798dab3bb820f9ae6268bb6f51d8bc946a45d9440fa93bb1fe3db77a24e899f9998fa222279540e2a608220e24fbd4712
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56d50c6aea0d791e535734304ce607dc5
SHA1179c1f1d876c245e4b8e5e8f32571de9ab8f09ac
SHA256dfb2e59e3cc3e5a9f2562316a1d1b5c4f22b26e80910a78b66e426f8e26e0823
SHA5121609372b6100996cf35376bf32a69d11dc6bf960b1544c452eddfb6e10246e51ae72c5e411f7cc31bc4ad37f2ab9dbb9d31b1ff1a5a8f44a2c4503b655db6029
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5de44fa12b5c7656114c26266308b9c55
SHA1193b687266add4e394fc6228cfd2edfdcd75ec24
SHA2564b94d42c66408628a4e0ad494c418fec91a9a742e8d2808f6c846cb480433454
SHA512e2f426172761f08c1fb358798b4a4013178b59854090e9bc76a55dfd19345f71e8d8603fc38c3e295b6e1b20cd723a813431adea2878e8ceb4b0229350a8ec67
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5aedb507fe9cdf8a2be56aac1157d6016
SHA10e2508cc5b9b0ce6c008adf9520d059263b9d493
SHA25657e20586e3a7f2c123126fc94368f2c78eb99f35a753142a7df450942199f807
SHA5120ff7a1fab34728c487d9ddf125e0f8fc5485b8ddfdd6eba8367c3240a7a8bbfc1394953fe827db51da4131a8c3496b52eed02adf394aac59ca460670f7f9e819
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55c1620f16e89b7d7cca22183e32f63d2
SHA1b8bba54c91408dd5fd2df9c28613a18f169a599d
SHA256d7378dee3b5d2be5c5a72d7dbb3f677a43582d1d26feecc6723ef1a36c395f10
SHA5126eaf3fbc6d678587cbbe6b1a8322f086eed793917ba29acc0e216b30b8b26118b3bf360b337b3a5096e1c34990feedf10df458f4d174625f89f1578f9720ab1b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5ef665bb4408ccbbcfeb0dcf6a7e44553
SHA1eaf5e66178f0a17aa3b48ed556dd78975c6d7705
SHA2567bfe77f7230f2c855a24a63281d1a99037c8d97c2379042bdcd061694a8dbc5a
SHA512fec58ae52caec2c8e4410dc3731d994a20b6d25183c1b3561fe13d51e17136e4b0d544a093518b5e6bc4d19d5d21839e885872aca30fba903956156dba3eca65
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD09C231-877C-11EF-833B-EE9D5ADBD8E3}.dat
Filesize5KB
MD5f250b722b4173c770021e491b90bac5f
SHA1f762e83fe5d7802c800fb173dba2a708c3f11895
SHA256ae5411c40b9969e4616819be463cf62e80bb7885fb7531ec4954597f569ea645
SHA5126dfa64bcbd505eb51b1005ac4aff56d020b6436afd363d65b8eabbe0b10c7a0332df061fac0c9ed0eab7eb523140a0606cd3a01cdb072fd22588775fbfe3227a
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{CD323991-877C-11EF-833B-EE9D5ADBD8E3}.dat
Filesize5KB
MD5dd2e5b874ca7c70f4120e914d03cdcd4
SHA1ef92d953c89549a37d0b3d444553ac055d910ef7
SHA25603f2d15bcc2aa53061ec50e05cbd09b8c80656186e3ee99f0c018e8e36a58d44
SHA512b35eaf6c1074ba198cf6f022081e8a8a1da12d36c6269ad16c3dd944755edfeffdf4494eb0a97cff0e1ea4a3600af682fd7e9e660a26715f773b2c3607cfb1af
-
Filesize
823B
MD584b1a5a529c1fcefce2b4ab1c84c90cb
SHA1a00ea7622732b573000909eabb3981a435e61588
SHA256c7e3f98061ce60f99799e94241b2b105dffcfdc08ff5bc02550167b049106578
SHA5128dc813d35abc96975338dab09b93c62d3c81bdaf8a626b858eac7e6cd779d02393e92dda11b7e9a52a3806742979e28399060673f855022739077cf73aeb92fd
-
Filesize
8.0MB
MD57d0cd52d0ffdcaaf0ee09edebd9f574f
SHA118521b66a01d2396c69ffc65c2848b1aab77b75f
SHA2569e19b9c55f1ff94019ea14f7ad228a8d591c6fc75f195cf7375cb61f53545915
SHA512605825e7b4e386e2f3dbfdee835e92eeafcb5e7ba6fb21fef16a0cdd9881b59603c3f4c71edf2a93305633f9e62b4c092bfacb9c0dcd0c9c8a2455fa127df310
-
Filesize
75KB
MD58015ab2cc394e54e4a36a0bad7027768
SHA11c15df81fdcace56f59bd45911f0bc9e37ed521f
SHA2568b82c3b3b26aee27b8cf5bdfb6e947a0cdcab7e6015f786f4df851d9c2eec42c
SHA5129fe2c5588e429d2887b7a16427110e32c579140906d68665c19cc8bc3738fa7ac596ac49974e8426877d1154101ed83e6685485a2531c3ffe5bc61c581be20e8
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
125KB
MD5b0bcc622f1fff0eec99e487fa1a4ddd9
SHA149aa392454bd5869fa23794196aedc38e8eea6f5
SHA256b32687eaaad888410718875dcbff9f6a552e29c4d76af33e06e59859e1054081
SHA5121572c1d07df2e9262d05a915d69ec4ebeb92eab50b89ce27dd290fb5a8e1de2c97d9320a3bb006834c98b3f6afcd7d2c29f039d9ca9afaa09c714406dedbc3c7
-
C:\Windows\Installer\{0D3BB12F-9903-4D4A-A062-97947D2AB44E}\server_start_C00864331B9D4391A8A26292A601EBE2.exe
Filesize96KB
MD59e2c097647125ee25068784acb01d7d3
SHA11a90c40c7f89eec18f47f0dae3f1d5cd3a3d49b5
SHA256b4614281771ed482970fd0d091604b3a65c7e048f7d7fa8794abd0a0c638f5d2
SHA512e2f334f31361ea1ffc206184808cb51002486fe583dc23b4f617bead0e3940fdc97b72cda2a971e2cf00462940b31e065228f643835d156e7166e8803e3181f1
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize914B
MD5e4a68ac854ac5242460afd72481b2a44
SHA1df3c24f9bfd666761b268073fe06d1cc8d4f82a4
SHA256cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f
SHA5125622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC
Filesize252B
MD52721490eb1d9253a4356ce3042233007
SHA156e9ea570135b53bab1e3774ba6b100b36518b80
SHA256f51cd31470036e1d1194f85f1962cbdeff510d26191a29a2aecb0282c16c6e8a
SHA5129e640e86eb1acad7948f02b81b58601c247ee47afa8c13ca43edb7bf658a70441441be97841d3e5d6efb8de9dc4e78d542fae4a180d65de198974dae1eb75dd3
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD54fd9021df215ce7895a3f8e888affb8f
SHA130f0002248f35e02cd62330218347d62c7ce025f
SHA256bf2583b624ac389b88e433d9e445f7d98991604cedb062a538dacf82fb7d1143
SHA5127f80058b6e73f58004244098da1d197b61f826314438bb94a56578e1244a52faa97f888a50322fb58261f9e78dc1013f52e25c23b973021ebe4be2d0b503d4fb
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD566644d49c1954a04d6bb5cdbaae4cf50
SHA13e1e073608e72f34e2376270acf7328805e88853
SHA256078e177f9283384fceae49b4c484a87a87bdf99deabb20425cea75b8ef3f1e46
SHA512c6e787dd41721455e1c5e48e69a7c0b6bc215dfb84dd7aae22b59a0a4931bc36f3a3c40d0a2d8b56c228d3181fe58ea2a3b4165edb05bad43dde9138bfd9b75e
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5275e51068de99388c112714cdf07c5b0
SHA12030de6d9d08eacece7851e975d4c3383e11cced
SHA2569cf35c65bf88bc4795794b209e54fd4aff7ec76a099fcf0c83681bec569c8008
SHA512d01e20304fa8e758854937707a512e32d475df4664148fd029d2693fb4876270add7d86a44dc0fc9490cfd39837466268ceb5e63ce4cbba19065480586add173
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ff4dac2ab6418bde80519a9e190c5828
SHA11538d76e6dd4b05cf44873d8bd2f36916b8691c8
SHA256dac3c0fc20638a4d45ddfc1c8d152aa70b92a8dc7466e255eea7fe710991242d
SHA512abc2743e3da189b24dd960a66880a8a5d9879fadd8298922dd38ac1cd2bbc9d771acb8a3d3cb66d865016684a283b6b39b487de916a8f81ee4c3523c92dbeba1
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5eb0c46ab00c1477a67e6fa62fa7a27bb
SHA11df18323f27705cbac2fd5fe238d2b22a191f493
SHA25627e374ed28877dd09169ee31942910b604eb3c2db5e53abf398979b52d1286e1
SHA51268a7d0825ec2a2eddc4a315b84a6f7ec113777e1bcff8594d935a97689d8670222ac8cd60afa2e21c560202f8d923233e1b07369842fde9c9fbdf3daac79f5ce
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e091abbe1ef7ef17c74ebdd7d35444d1
SHA17f4ad7c628208c974fbb91d31d1e3d986fe4de8c
SHA2567a957e43cfee2558fa0d5301d4b4cfbbe3bb4f47e324370af3177a8dd859d5c4
SHA512e5fb181b780c3a98cc028c9bc4692c0b4bac0f428a0ce147c42a09188778db3939ef48344fb41dae91dc7dbc5152383c260838773a94931f60c9fafcb5c67047
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c1981cbe0bdd3349b0f156480fc739f9
SHA1daec495cee1dac963e9330ba1784059368fee2c8
SHA2565c61f69d90161920084ab7d40f3af629a267f89061bc9b538fd6bb9b1e7e05ac
SHA512d5fb4c41e864f3521cd32737f7062f295fa48daa9fa6e07751950b52789a9f75256ecd01c445800eba84530d59b4933889f5ea3723b386a07539402cddb6a49f
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5010c10e5c1fd3b18ca69443d64d790c9
SHA1eb1137d23e62343c50ef1657b9b16a3f0262a7ec
SHA2568c4eadb5d1313cfef24d88b51956d733fcbff00e6d3b30d33f089a07a0ab18e1
SHA512a76c1ade973e36bcfdd6376047fd2a3e15bbdbcb9416c8f97667d723a08200ced3dd6e405a929acfe59db0041f7341d018b311bc3b22ac8bd5bcd026116f5330
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f418022a94103fef8e1416e447048c41
SHA1c4761fe747330d1bdc4c8d088f37f08947db6507
SHA25622ea87c874acf6dd7b02fe9d6d892d85475c06d8b8849348d48faca676d6ddc5
SHA512bbd20292894d31a8b046526e7ee15549863bd83fbfe9ead51a82e78d6cf2b73b40ec5aa56f2c64ecdee8502ab1a8e84c93de330634f61b6226ede11471821902
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD599df7252b1074bfa0cc8d53d15854da8
SHA115fd27a580b9dfecbeeb11e5e3d914c67bbcf705
SHA256eed6243b1bcbefa9351acc7a26b8a0e8aa02039e82f9ede22f9fff8ed38dcb5b
SHA51226ff3b67a175e07f3eb1164c0f95dae15037a1afabbafd20dc178e7a2987d079d2ef827120a0aff69c5c98184ff915177c2a9b15a9efea150dfa95429e2f294c
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD58488fa9f1f5ea5f8a065d9873ba13cdb
SHA13204d7932328c097621ed4787f51805268b47964
SHA256179d9a5f3278a2e983bfbab9035b72b88bfd3cb4700e12dea57b7cfdaf9fbeb3
SHA51286db33bfd47a347a44ce78c0afb4ff45f1678b654211244ff70cec39f0e1e0d1671de1ed531566f2bf9bd5419ca71d5ef25ffbe613b144ca97d8030704cd5951
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575c96914f930099c17ba292dcd2621cf
SHA1a4bbc363a6b585f172e2679fd435d56fb59aaa82
SHA25616efcc05f3950a27fb57e6b2951ff70c73e54f45de07cb7694199231ea87f4ba
SHA5125caff9103ec631e0aac004d17f1cf06d25987056894514e724f5950bcde922d8f2b65359769d7be7ee4817eee846a612477171be106a7c83163f5203ff343dc0
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD528efe1e3623cbe8da92e9b6c526122f9
SHA155e0862edb5b9def01c67f545efa305ac789e19d
SHA25603af2a87e34d1a91ca3e92eefd28b0d5b1c35b98000a21b726e558fe1489cdde
SHA5122512de1262506cec63948c362ac00dc496750214f2223cb867769d8a0e56de6bd7aa3aec79f9febaf95a3262388866f20662b63837a7a6f0024ba49defe37cb3
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5a64d3037a180d2e66abdea51bfada2aa
SHA126a5080158a8e3d01744d0a2d1cd03b7fce28912
SHA25605229ed7eaff9b49fd9043c2be58dd5cc15e63fa88e830ba3d97cfb9d66d9f75
SHA51298e89a864abe350e17ef62d05c8e5176de1de5404a73d3406d8e607c256b87888aa9321d1c2f4924489d2880d19c7c8b8c4932ea1e1f3c314bac92716f731435
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5836507b8d5e4ad6efebdd4747ea16a3f
SHA1153e4f5219debbe615e31cd7bfcceb91919b96b0
SHA25670b7d8b3201352c2eba066ebdb7d22de7fc7267b066b9fe8094acbf9b155cfe1
SHA5126edfdb5c6f635ebbbd5b77962be8e6e3510703dcee21cf1e600c10a22931cd1c2fe6f5e72a45e4563aab5abb66c7d48923283d0940273e77699f16f6693c219f
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b2637f54f5f9aa9bf94fe6c53ba25bbb
SHA117606e86b452c8c74ccd805db23158e3f7aee983
SHA256304e24c042102f839e52d6b58970fd5d0708c5e783bd5ff2be7ca45c14202826
SHA512997b614ced4fd614f5079fe643e10b4fb5c3ec03e5aa0dbd02ec221c61ebf309f57114b4777fa72410838e2c58b0455a13f4af94f3ae68324068d2ce2fd4b20c
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD537e0dfe71e572878e0b0e37a58142262
SHA1d2d16e007f3abffde2384b51cb37e7fb7e8e2a8b
SHA256e81bd388f5afa0e872611e02cda64eac1e1ae2aeea832d71fe1b5a539bea2c91
SHA512a150e4efd8ab88c280e85acff24550516591e643aacb3eb847d5984c0e17140ea42ca6650e4d8d3809497464b3ec80e88620d0d70ac0b89e3a5da49e72b2c145
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e2948f257de27ac71147527c662469e9
SHA1aec6a244728c8985785b3a914497949dcf0f862a
SHA2562d077c9c26be60fd7561f3c30d865d27b4a8916b102e3dfd63506f18a27a0edb
SHA5123f2aa264ba8f96e5a340e26b4a63d77bc2e953baf6c6655ee86badec77f6a9d93554fa50cbbacbecb3e392754d952bf92eb766e905b938390ad26625b59e9336
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5f2c901ff6b2a3f17024eebaf29d0757c
SHA1cbc82ec8511a3017e0685a4ff405a3da8c495c47
SHA256ef96ef7f0f4f2af8a80acb480715c4d8d6fd564ae21a25fd7fba3280f1d2ac19
SHA51298c38c0890e576cd3336d09b85d65463e6239584f77f10ab829459cea0265941660bb4bf0e17b6e84c70a984d70a5bffa71e9ee582fa6d991a9a015a83d82cc0
-
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico
Filesize4KB
MD5da597791be3b6e732f0bc8b20e38ee62
SHA11125c45d285c360542027d7554a5c442288974de
SHA2565b2c34b3c4e8dd898b664dba6c3786e2ff9869eff55d673aa48361f11325ed07
SHA512d8dc8358727590a1ed74dc70356aedc0499552c2dc0cd4f7a01853dd85ceb3aead5fbdc7c75d7da36db6af2448ce5abdff64cebdca3533ecad953c061a9b338e
-
Filesize
129B
MD52578ef0db08f1e1e7578068186a1be0f
SHA187dca2f554fa51a98726f0a7a9ac0120be0c4572
SHA256bdc63d9fd191114227a6e0ac32aaf4de85b91fc602fcb8555c0f3816ac8620b3
SHA512b42be0e6f438362d107f0f3a7e4809753cf3491ab15145f9ffa4def413606243f4dfffc0449687bd1bb01c653e9339e26b97c286382743d14a2f0ed52e72f7ee
-
Filesize
236B
MD511cede0563d1d61930e433cd638d6419
SHA1366b26547292482b871404b33930cefca8810dbd
SHA256e3ab045d746a0821cfb0c34aee9f98ce658caab2c99841464c68d49ab2cd85d9
SHA512d9a4cdd3d3970d1f3812f7b5d21bb9ae1f1347d0ddfe079a1b5ef15ec1367778056b64b865b21dd52692134771655461760db75309c78dc6f372cc4d0ab7c752
-
Filesize
80B
MD53c106f431417240da12fd827323b7724
SHA12345cc77576f666b812b55ea7420b8d2c4d2a0b5
SHA256e469ed17b4b54595b335dc51817a52b81fcf13aad7b7b994626f84ec097c5d57
SHA512c7391b6b9c4e00494910303e8a6c4dca5a5fc0c461047ef95e3be1c8764928af344a29e2e7c92819174894b51ae0e69b5e11a9dc7cb093f984553d34d5e737bb
-
Filesize
402B
MD5881dfac93652edb0a8228029ba92d0f5
SHA15b317253a63fecb167bf07befa05c5ed09c4ccea
SHA256a45e345556901cd98b9bf8700b2a263f1da2b2e53dbdf69b9e6cfab6e0bd3464
SHA512592b24deb837d6b82c692da781b8a69d9fa20bbaa3041d6c651839e72f45ac075a86cb967ea2df08fa0635ae28d6064a900f5d15180b9037bb8ba02f9e8e1810
-
Filesize
29KB
MD5d59a6b36c5a94916241a3ead50222b6f
SHA1e274e9486d318c383bc4b9812844ba56f0cff3c6
SHA256a38d01d3f024e626d579cf052ac3bd4260bb00c34bc6085977a5f4135ab09b53
SHA51217012307955fef045e7c13bf0613bd40df27c29778ba6572640b76c18d379e02dc478e855c9276737363d0ad09b9a94f2adaa85da9c77ebb3c2d427aa68e2489
-
Filesize
81KB
MD5b13f51572f55a2d31ed9f266d581e9ea
SHA17eef3111b878e159e520f34410ad87adecf0ca92
SHA256725980edc240c928bec5a5f743fdabeee1692144da7091cf836dc7d0997cef15
SHA512f437202723b2817f2fef64b53d4eb67f782bdc61884c0c1890b46deca7ca63313ee2ad093428481f94edfcecd9c77da6e72b604998f7d551af959dbd6915809c
-
Filesize
195B
MD5a1fd5255ed62e10721ac426cd139aa83
SHA198a11bdd942bb66e9c829ae0685239212e966b9e
SHA256d3b6eea852bacee54fbf4f3d77c6ec6d198bd59258968528a0231589f01b32f4
SHA51251399b4eac1883f0e52279f6b9943d5a626de378105cadff2b3c17473edf0835d67437ae8e8d0e25e5d4b88f924fa3ac74d808123ec2b7f98eff1b248a1ab370
-
Filesize
216B
MD52ce792bc1394673282b741a25d6148a2
SHA15835c389ea0f0c1423fa26f98b84a875a11d19b1
SHA256992031e95ad1e0f4305479e8d132c1ff14ed0eb913da33f23c576cd89f14fa48
SHA512cdcc4d9967570018ec7dc3d825ff96b4817fecfbd424d30b74ba9ab6cc16cb035434f680b3d035f7959ceb0cc9e3c56f8dc78b06adb1dd2289930cc9acc87749
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
52KB
MD517efb7e40d4cadaf3a4369435a8772ec
SHA1eb9302063ac2ab599ae93aaa1e45b88bbeacbca2
SHA256f515564b67efd06fa42f57532feafc49d40b0fc36c5d4935300dd55416f0a386
SHA512522fba06304950860fa9aa8933b12b9323dea47dbda363db3f57535396c156c4cf6934a9db38fff8c77503fcb889d030fadb639094a1f34bbad54c79c8734450
-
\Users\Admin\AppData\Local\Temp\[email protected]
Filesize7.3MB
MD52301cccede41eb07e3dc2500f1329396
SHA133b53834b33e4e58def78c5fa8cd11f48e6c5b3b
SHA256f17658128108875ba8a1b8ac7f6ba1696b3f7b466fcf00012a17bbcff03f77c1
SHA512dfddee8bdecbfab18cbeae959b98dc97092937b7bc2af2b50bdc3c534fe7935cd48051de74939639ea95bac6fc002a7c12fd77cc44448a05090593e5bf298574