Analysis
-
max time kernel
150s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12-10-2024 13:08
Behavioral task
behavioral1
Sample
3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe
-
Size
768KB
-
MD5
3a2e6d51b199bb631eea59c8cac27902
-
SHA1
18dc174c9a25f5dcf1777cfeed0e97b5c5f7eb4c
-
SHA256
bca57f1b02cb2521fbcbb1f36f99dc2e47ec6df6bc88f24ec000b96c0f032592
-
SHA512
662c75d6964317b8bb7d451a543f3da28e134d22dd558f677c3d357e413e243efe775a6ba562071257d07e8318569bd751d08100f5353b9821ed7d2bccefc6d5
-
SSDEEP
12288:jXe1Z2fJipMHEgSeA6M7kmchJGvRuORtcE9qTpy+Yg0HkV+UgWRDkj9tyTEAjRc0:ztkmHEgSewkmchJGsORtn9qT8+Yg03ZU
Malware Config
Signatures
-
FlawedAmmyy RAT
Remote-access trojan based on leaked code for the Ammyy remote admin software.
-
Blocklisted process makes network request 1 IoCs
flow pid Process 14 2732 rundll32.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Control Panel\International\Geo\Nation 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
Loads dropped DLL 4 IoCs
pid Process 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\A82946818BB0433A7DC1AFD2189B16AF 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\A82946818BB0433A7DC1AFD2189B16AF 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
Modifies data under HKEY_USERS 64 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26\WpadDecision = "0" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\e6-0f-6b-52-b9-26 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Ammyy\Admin 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadDecisionReason = "1" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Ammyy 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Ammyy\Admin\hr3 = c69ed7dd3d2ed51fbccd9fbcfe8861f913ff8e6f1ef4bf532468b4976104d0f1e8ab95c4d4131239d293a9fadf371884909b92425516a561fb6b7369245d33b30f9c333a53eb455c39d59a 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2} 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadDecisionTime = b02a33eca71cdb01 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\My 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f0125000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\2D\52C64B7E\LanguageList = 65006e002d0055005300000065006e0000000000 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26\WpadDecisionTime = b02a33eca71cdb01 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadDecision = "0" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (str) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{CB7F8597-7AEA-4992-9284-338F00D4AEB2}\WpadNetworkName = "Network 3" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\e6-0f-6b-52-b9-26\WpadDecisionReason = "1" 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe 2732 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeLockMemoryPrivilege 2732 rundll32.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1476 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1476 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2536 wrote to memory of 1476 2536 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 31 PID 2536 wrote to memory of 1476 2536 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 31 PID 2536 wrote to memory of 1476 2536 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 31 PID 2536 wrote to memory of 1476 2536 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 31 PID 1476 wrote to memory of 2732 1476 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 32 PID 1476 wrote to memory of 2732 1476 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 32 PID 1476 wrote to memory of 2732 1476 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 32 PID 1476 wrote to memory of 2732 1476 3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
PID:1096
-
C:\Users\Admin\AppData\Local\Temp\3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe" -service -lunch1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3a2e6d51b199bb631eea59c8cac27902_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Modifies system certificate store
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\rundll32.exerundll32.exe "C:\ProgramData\AMMYY\aa_nts.dll",run3⤵
- Blocklisted process makes network request
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
902KB
MD5480a66902e6e7cdafaa6711e8697ff8c
SHA16ac730962e7c1dba9e2ecc5733a506544f3c8d11
SHA2567eaaaa6010bbcd6bb8c9ad08d4b0966c7aedc9b2ac24758f170012ac36e508b5
SHA5127d010cd47b7d1adf66f9c97afc6c3805997aa5c7cc6ff13eddee81f24cf2b95a3fe375ec5b3d6185c0bc8840b4ad91ae143c73a39af26391cc182ab6a1793ba5
-
Filesize
4KB
MD57e31cc9f66e960abee2beeed5a96d108
SHA11a73fa249b60186d75c1a6239732b5711de1c6f1
SHA2566b6983036aa2d3ebd9ea43317a2f7cb7c175ec0f2b1ebf04fc446cfe8a0b0bd7
SHA512cd7ea5cbc2f4f7f918697e41a97ef1124ed34ec90682c6826e1f6c1c3fa9060d40f2996b1e43735ce99de9c26aae9a367c561666ab0c78a986e4b29a9386b1f2
-
Filesize
45B
MD5f5d867c23b8cac17baecc8cd2ac118b9
SHA1ab0da5d10496611ae18f28822c32507aa531dfc4
SHA25652ebeac5f05e8e12afb680e5e291b41a440cc7dbb812fddd075b6f7586c4fd2b
SHA5121a067037fb1a8f6782681902e6dc391e399c5caf3e430bdacc30d2cd36985d4eff72359d676e7799dbac3f2f58f697181934a67af18a366cb58a69e6f56e837d
-
Filesize
316B
MD5b76abe6342b5f0f93ed93ebe3ecf3d58
SHA11584113b9bb8f75a2fb2e50f55b9d4aa0da809a5
SHA2560dc6df67d820bc53f90333843bbe182466530f83bd86d9f440a772bf51daf414
SHA512058897103b6bafe76d419deca68ff2e83c09cbd8e5a96063d0f0ca73d23bbe2748cc1fdfac2140af89d5ad0e9637bc2ad9901824eeb0ea2079f99b266ecf51d8