Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 23:38
Static task
static1
Behavioral task
behavioral1
Sample
44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe
-
Size
1.4MB
-
MD5
44bd8f9ac9a3c8158b088f35b462685f
-
SHA1
fc9a02de2af758950542d3209400d4504cfeed37
-
SHA256
474632e0969c5835659a9d093a1578554b52cdd1b480c1fcb3b389f4b4fb5e6d
-
SHA512
a8225f6faa10bd34c96d3862fac70b67d8f3aa960187bbe9564938ff922202384d947e01897943411fe10bd0311ab97b72d27d81b419d942a5aa314ce1d0ed54
-
SSDEEP
24576:+VXnzzwJyAlaPq/yLGfCym9yMWbkExZDXTsOGlCs/Af3ilofeYdqbO/8nNovq9L:+NzCyyz/b/xMWbkETXTsOGZkiy9f/8nN
Malware Config
Signatures
-
Executes dropped EXE 55 IoCs
pid Process 2000 setup.exe 4480 INS9BC3.tmp 4368 tsadbot.exe 2612 tsadbot.exe 3840 ctinstall.exe 4900 tsadbot.exe 3204 tsadbot.exe 916 ctinstall.exe 2184 tsadbot.exe 2596 tsadbot.exe 4460 ctinstall.exe 4636 tsadbot.exe 2196 tsadbot.exe 1968 ctinstall.exe 2624 tsadbot.exe 1808 tsadbot.exe 3632 ctinstall.exe 116 tsadbot.exe 2892 tsadbot.exe 3540 ctinstall.exe 3388 tsadbot.exe 4236 tsadbot.exe 1088 ctinstall.exe 1568 tsadbot.exe 5024 tsadbot.exe 2740 ctinstall.exe 4052 tsadbot.exe 2560 tsadbot.exe 3600 ctinstall.exe 1428 tsadbot.exe 3408 tsadbot.exe 3332 ctinstall.exe 3004 tsadbot.exe 3040 tsadbot.exe 2324 ctinstall.exe 2896 tsadbot.exe 2088 tsadbot.exe 1700 ctinstall.exe 4952 tsadbot.exe 64 tsadbot.exe 3364 ctinstall.exe 4912 tsadbot.exe 4052 tsadbot.exe 4296 ctinstall.exe 1584 tsadbot.exe 1544 tsadbot.exe 2436 ctinstall.exe 844 tsadbot.exe 3572 tsadbot.exe 1032 ctinstall.exe 4576 tsadbot.exe 1376 tsadbot.exe 4768 ctinstall.exe 3260 tsadbot.exe 4356 tsadbot.exe -
Loads dropped DLL 55 IoCs
pid Process 4480 INS9BC3.tmp 4480 INS9BC3.tmp 4368 tsadbot.exe 2612 tsadbot.exe 3840 ctinstall.exe 4900 tsadbot.exe 3204 tsadbot.exe 916 ctinstall.exe 2184 tsadbot.exe 2596 tsadbot.exe 4460 ctinstall.exe 4636 tsadbot.exe 2196 tsadbot.exe 1968 ctinstall.exe 2624 tsadbot.exe 1808 tsadbot.exe 3632 ctinstall.exe 116 tsadbot.exe 2892 tsadbot.exe 3540 ctinstall.exe 3388 tsadbot.exe 4236 tsadbot.exe 1088 ctinstall.exe 1568 tsadbot.exe 5024 tsadbot.exe 2740 ctinstall.exe 4052 tsadbot.exe 2560 tsadbot.exe 3600 ctinstall.exe 1428 tsadbot.exe 3408 tsadbot.exe 3332 ctinstall.exe 3004 tsadbot.exe 3040 tsadbot.exe 2324 ctinstall.exe 2896 tsadbot.exe 2088 tsadbot.exe 1700 ctinstall.exe 4952 tsadbot.exe 64 tsadbot.exe 3364 ctinstall.exe 4912 tsadbot.exe 4052 tsadbot.exe 4296 ctinstall.exe 1584 tsadbot.exe 1544 tsadbot.exe 2436 ctinstall.exe 844 tsadbot.exe 3572 tsadbot.exe 1032 ctinstall.exe 4576 tsadbot.exe 1376 tsadbot.exe 4768 ctinstall.exe 3260 tsadbot.exe 4356 tsadbot.exe -
Adds Run key to start application 2 TTPs 19 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\InboxSpecialist = "C:\\Program Files (x86)\\InboxSpecialist2000_458\\InboxSpecialist.exe /tray" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\TimeSink Ad Client = "\"C:\\Program Files (x86)\\TimeSink\\AdGateway\\tsadbot.exe\"" tsadbot.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\is-7LSV0.tmp INS9BC3.tmp File opened for modification C:\Windows\SysWOW64\is-7LSV0.tmp INS9BC3.tmp File created C:\Windows\SysWOW64\is-DV71T.tmp INS9BC3.tmp File opened for modification C:\Windows\SysWOW64\is-DV71T.tmp INS9BC3.tmp -
Drops file in Program Files directory 55 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-IERPF.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-8JCH9.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010007.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\is-LA5KD.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\is-P3TCA.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-97GLP.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-PKHN1.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010005.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\TimeSink\AdGateway\Profiles\InboxSpecialist\Admin\gutmannsoft\Done.cdb 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010001.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\is-ORU7N.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\TimeSink\AdGateway\Profiles\InboxSpecialist\Admin\gutmannsoft\Done.idx 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\0101000a.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-97GLP.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-73SEI.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010008.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010009.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\is-IERPF.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-73SEI.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\unins000.exe INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\rc 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\is-PRMKL.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\is-8JCH9.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-LA5KD.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-P3TCA.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-PRMKL.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\is-FMO1N.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010002.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010006.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\is-SUUKM.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\is-8DI6G.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-8DI6G.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Sounds\is-NQF0E.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-A9RPC.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-GCAR9.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe tsadbot.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-PKHN1.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010004.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\is-3V348.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\is-5ROD4.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-GCAR9.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-3V348.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\Sounds\is-NQF0E.tmp INS9BC3.tmp File created C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-7H9V5.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\unins000.dat INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-ORU7N.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-SUUKM.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-FMO1N.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-A9RPC.tmp INS9BC3.tmp File opened for modification C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe tsadbot.exe File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\Skins\Default\is-7H9V5.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Ads\1544\01010003.004 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe File created C:\Program Files (x86)\InboxSpecialist2000_458\unins000.dat INS9BC3.tmp File opened for modification C:\Program Files (x86)\InboxSpecialist2000_458\is-5ROD4.tmp INS9BC3.tmp File created C:\Program Files (x86)\TimeSink\AdGateway\Profiles\InboxSpecialist\Admin\gutmannsoft\Done.idx 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File opened for modification C:\Windows\is-M6K46.tmp INS9BC3.tmp File created C:\Windows\is-TPLN3.tmp INS9BC3.tmp File opened for modification C:\Windows\is-TPLN3.tmp INS9BC3.tmp File created C:\Windows\is-M6K46.tmp INS9BC3.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INS9BC3.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ctinstall.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tsadbot.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\ProgID\ = "Mabry.MailCtrl" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604} INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE4-4546-11D0-86B1-0020AF1EF604}\InprocServer32\ = "C:\\Windows\\SysWow64\\MRAS32.OCX" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\Version\ = "1.0" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5904-01D9-11D0-9E0A-444553540000}\InprocServer32 INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\ProxyStubClsid32 INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\TypeLib\ = "{973C8EE3-4546-11D0-86B1-0020AF1EF604}" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Mabry.RASCtrl\ = "Mabry RAS Control" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\ToolboxBitmap32 INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\Control\ INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BAF5901-01D9-11D0-9E0A-444553540000}\TypeLib\ = "{8BAF5903-01D9-11D0-9E0A-444553540000}" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\MiscStatus INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{973C8EE3-4546-11D0-86B1-0020AF1EF604} INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\InprocServer32\ = "C:\\Windows\\SysWow64\\MMAIL32.OCX" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MMAIL32.OCX, 1" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\MiscStatus\1\ = "132241" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\TypeLib INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8BAF5903-01D9-11D0-9E0A-444553540000}\5.1\FLAGS\ = "2" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\ProgID INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\ToolboxBitmap32 INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MRAS32.OCX, 1" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BAF5901-01D9-11D0-9E0A-444553540000}\TypeLib\Version = "5.1" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\TypeLib\ = "{973C8EE3-4546-11D0-86B1-0020AF1EF604}" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\InprocServer32 INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\TypeLib INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BAF5902-01D9-11D0-9E0A-444553540000}\ = "_DMailEvents" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BAF5902-01D9-11D0-9E0A-444553540000}\ = "_DMailEvents" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\MiscStatus\1 INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\TypeLib\ = "{973C8EE3-4546-11D0-86B1-0020AF1EF604}" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mabry.RASCtrl\CLSID INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\ = "Mabry RAS Control" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8BAF5903-01D9-11D0-9E0A-444553540000}\5.1\0 INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BAF5901-01D9-11D0-9E0A-444553540000}\TypeLib INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{973C8EE3-4546-11D0-86B1-0020AF1EF604}\1.0\0\win32 INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\TypeLib INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\MiscStatus\1\ = "132497" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\TypeLib INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{973C8EE3-4546-11D0-86B1-0020AF1EF604}\1.0\FLAGS INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604} INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8BAF5903-01D9-11D0-9E0A-444553540000}\5.1 INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BAF5901-01D9-11D0-9E0A-444553540000} INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BAF5901-01D9-11D0-9E0A-444553540000}\ProxyStubClsid32 INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BAF5901-01D9-11D0-9E0A-444553540000}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\TypeLib INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE4-4546-11D0-86B1-0020AF1EF604}\ = "Mabry RAS Property Page" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BAF5902-01D9-11D0-9E0A-444553540000}\ProxyStubClsid32 INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5900-01D9-11D0-9E0A-444553540000}\MiscStatus\ = "0" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\TypeLib\Version = "1.0" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{8BAF5904-01D9-11D0-9E0A-444553540000}\ = "Mabry Mail Property Page" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{973C8EE3-4546-11D0-86B1-0020AF1EF604}\1.0\FLAGS\ = "2" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\TypeLib\ = "{973C8EE3-4546-11D0-86B1-0020AF1EF604}" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8BAF5903-01D9-11D0-9E0A-444553540000}\5.1\HELPDIR INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BAF5902-01D9-11D0-9E0A-444553540000}\TypeLib INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Mabry.MailCtrl\CLSID INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\Version INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{8BAF5902-01D9-11D0-9E0A-444553540000}\TypeLib\ = "{8BAF5903-01D9-11D0-9E0A-444553540000}" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\TypeLib\Version = "1.0" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{973C8EE2-4546-11D0-86B1-0020AF1EF604}\TypeLib\Version = "1.0" INS9BC3.tmp Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{973C8EE1-4546-11D0-86B1-0020AF1EF604}\ = "_DRAS" INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604} INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{973C8EE0-4546-11D0-86B1-0020AF1EF604}\MiscStatus\1 INS9BC3.tmp Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{8BAF5902-01D9-11D0-9E0A-444553540000} INS9BC3.tmp -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3516 wrote to memory of 2000 3516 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe 84 PID 3516 wrote to memory of 2000 3516 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe 84 PID 3516 wrote to memory of 2000 3516 44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe 84 PID 2000 wrote to memory of 4480 2000 setup.exe 94 PID 2000 wrote to memory of 4480 2000 setup.exe 94 PID 2000 wrote to memory of 4480 2000 setup.exe 94 PID 4480 wrote to memory of 4368 4480 INS9BC3.tmp 103 PID 4480 wrote to memory of 4368 4480 INS9BC3.tmp 103 PID 4480 wrote to memory of 4368 4480 INS9BC3.tmp 103 PID 4368 wrote to memory of 2612 4368 tsadbot.exe 104 PID 4368 wrote to memory of 2612 4368 tsadbot.exe 104 PID 4368 wrote to memory of 2612 4368 tsadbot.exe 104 PID 4480 wrote to memory of 3840 4480 INS9BC3.tmp 105 PID 4480 wrote to memory of 3840 4480 INS9BC3.tmp 105 PID 4480 wrote to memory of 3840 4480 INS9BC3.tmp 105 PID 4480 wrote to memory of 4900 4480 INS9BC3.tmp 107 PID 4480 wrote to memory of 4900 4480 INS9BC3.tmp 107 PID 4480 wrote to memory of 4900 4480 INS9BC3.tmp 107 PID 4900 wrote to memory of 3204 4900 tsadbot.exe 108 PID 4900 wrote to memory of 3204 4900 tsadbot.exe 108 PID 4900 wrote to memory of 3204 4900 tsadbot.exe 108 PID 4480 wrote to memory of 916 4480 INS9BC3.tmp 109 PID 4480 wrote to memory of 916 4480 INS9BC3.tmp 109 PID 4480 wrote to memory of 916 4480 INS9BC3.tmp 109 PID 4480 wrote to memory of 2184 4480 INS9BC3.tmp 110 PID 4480 wrote to memory of 2184 4480 INS9BC3.tmp 110 PID 4480 wrote to memory of 2184 4480 INS9BC3.tmp 110 PID 2184 wrote to memory of 2596 2184 tsadbot.exe 111 PID 2184 wrote to memory of 2596 2184 tsadbot.exe 111 PID 2184 wrote to memory of 2596 2184 tsadbot.exe 111 PID 4480 wrote to memory of 4460 4480 INS9BC3.tmp 112 PID 4480 wrote to memory of 4460 4480 INS9BC3.tmp 112 PID 4480 wrote to memory of 4460 4480 INS9BC3.tmp 112 PID 4480 wrote to memory of 4636 4480 INS9BC3.tmp 114 PID 4480 wrote to memory of 4636 4480 INS9BC3.tmp 114 PID 4480 wrote to memory of 4636 4480 INS9BC3.tmp 114 PID 4636 wrote to memory of 2196 4636 tsadbot.exe 115 PID 4636 wrote to memory of 2196 4636 tsadbot.exe 115 PID 4636 wrote to memory of 2196 4636 tsadbot.exe 115 PID 4480 wrote to memory of 1968 4480 INS9BC3.tmp 116 PID 4480 wrote to memory of 1968 4480 INS9BC3.tmp 116 PID 4480 wrote to memory of 1968 4480 INS9BC3.tmp 116 PID 4480 wrote to memory of 2624 4480 INS9BC3.tmp 119 PID 4480 wrote to memory of 2624 4480 INS9BC3.tmp 119 PID 4480 wrote to memory of 2624 4480 INS9BC3.tmp 119 PID 2624 wrote to memory of 1808 2624 tsadbot.exe 120 PID 2624 wrote to memory of 1808 2624 tsadbot.exe 120 PID 2624 wrote to memory of 1808 2624 tsadbot.exe 120 PID 4480 wrote to memory of 3632 4480 INS9BC3.tmp 121 PID 4480 wrote to memory of 3632 4480 INS9BC3.tmp 121 PID 4480 wrote to memory of 3632 4480 INS9BC3.tmp 121 PID 4480 wrote to memory of 116 4480 INS9BC3.tmp 122 PID 4480 wrote to memory of 116 4480 INS9BC3.tmp 122 PID 4480 wrote to memory of 116 4480 INS9BC3.tmp 122 PID 116 wrote to memory of 2892 116 tsadbot.exe 123 PID 116 wrote to memory of 2892 116 tsadbot.exe 123 PID 116 wrote to memory of 2892 116 tsadbot.exe 123 PID 4480 wrote to memory of 3540 4480 INS9BC3.tmp 124 PID 4480 wrote to memory of 3540 4480 INS9BC3.tmp 124 PID 4480 wrote to memory of 3540 4480 INS9BC3.tmp 124 PID 4480 wrote to memory of 3388 4480 INS9BC3.tmp 125 PID 4480 wrote to memory of 3388 4480 INS9BC3.tmp 125 PID 4480 wrote to memory of 3388 4480 INS9BC3.tmp 125 PID 3388 wrote to memory of 4236 3388 tsadbot.exe 126
Processes
-
C:\Users\Admin\AppData\Local\Temp\44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\44bd8f9ac9a3c8158b088f35b462685f_JaffaCakes118.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\e57804c\setup.exe"C:\Users\Admin\AppData\Local\Temp\e57804c\setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\INS9BC3.tmpC:\Users\Admin\AppData\Local\Temp\INS9BC3.tmp /SL2 C:\Users\Admin\AppData\Local\Temp\e57804c\setup.exe 1389798 1392814 599043⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4368 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2612
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3840
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3204
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:916
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2596
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4460
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4636 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2196
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1968
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1808
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:116 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3540
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3388 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4236
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1088
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:5024
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2740
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4052 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1428 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3408
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3332
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3004 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3040
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2324
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2896 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4952 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:64
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3364
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4912 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4052
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4296
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1584 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1544
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:844 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3572
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1032
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4576 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1376
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4768
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\tsadbot.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"C:\Program Files (x86)\TimeSink\AdGateway\tsadbot.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4356
-
-
-
C:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exeC:\Users\Admin\AppData\Local\Temp\is-QLOR7.tmp\ctinstall.exe InboxSpecialist Y4⤵PID:216
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD53d178feca84b2c96c489cf5c5022fe56
SHA1e2a25a8c08284dda2669b3ba07054e822e3db1c1
SHA25662ec05292cc656a614c1c10064abe594b85f3705825f4a15bbd24f736180adcb
SHA512254e48a94a2557c1a5d11ed5f7e237835af29af1fa02b28a8a453eb040d6d4d5540ed4d7d3774b562eaed0473e0af2eeca2726347291bb0913e7f1bb729924ac
-
Filesize
340KB
MD524ba89618a33c309a3c739847ec79815
SHA15cf36961487ad9f8231c03372b236f7337940f67
SHA256b62282628050b1a48c77a00716fc571843cd385b8d563dcfc65eadeea104e22a
SHA512aa171133c7df46ccf68524d81ff5bfd88caaa8ba776119505a379d9b45ddd5d6c6d5b9037aefd13f1e9136a9afec8111a910e6241dde981d33efed3ce3cee0f3
-
Filesize
92B
MD5324448c4af4d2fb8432c552ca3ae2e5e
SHA1a58958807af2f1257c04cdb9b8bd789895619803
SHA256a60e8e868b9d8fd35d02564f13eac8bfe700d7c5d882adf3823e9c2d50bfa1bd
SHA512ac6d367b3e1af3df6db171b2e6c9dfe0c5a01dfcde76f47899b56cdbae3c59b597f92fc418e697a08feb9d5f00711f8e68d41ae3ff361a83d85e9943b64b73ed
-
Filesize
1.3MB
MD5f9a5568739a519e8b26a85f46b78f695
SHA15ab0331fb9bff357f8b613adb0b625819b8cc1e8
SHA256a314c40124ed5829d2621866f36f3d989d19ac9cd20c48cbbfb4f5ac917d926a
SHA512342f770a63f1c7d5978e1b65033883308087a4d9a92108e9ce7e5be86b5782a0725750abba331e9f7d0594dca7fdd8f02ab3db29ac4bd5a382d712326284b7af
-
Filesize
71KB
MD5eee07c076ae78f598205b8815cdf22dc
SHA1e4e2658a6b553e06f517cd061fae7a55100def5f
SHA256ce8e8fe3991577cc7a6baa8e43112c5dab9eff3e7a14a6061d98c31607bd23c9
SHA51242add87936bd0cef892160e192b732b7a47c10b084ebc7f3602c351c2f9b77f78ebac8679d18fdb222a51099c16d30a12581132936bfbaac85ee5f062ffcf756
-
Filesize
40KB
MD5879bd115d220898497311e6a6b660305
SHA1e9658651ca612de4357d6cf9e1b16d2e79b2e4b8
SHA256d45c36e79d825c899ad481c320145503a5e91533799d288427e0b468637f9d32
SHA512bc909c86e05333fa87b91c955a8289aaab4ff30ff351b27f7533924521e53a60bf27b62a14e7078c4ce271c96cbcbedcfe021989c940465f152fd4b81f7ba38a
-
Filesize
93KB
MD55da59b129aade5dd45c04455a3e6f74f
SHA1cd9282f0008e40219ac0c230ca4bb3b2544f73ff
SHA256241414c117e09b5fae702fd19136c37342d56f021a78ce1fabe11009534a0f63
SHA512064547c9213c25e669ac4fdbdaf29a29a8f3aa1c55509b0011a5ae51c1c799b6246f4635e4a697255fd28f443157daa22e165178bcd89df2997dea6342d14a1b
-
Filesize
98KB
MD57e6592ba9492148602dc3a5bb93bfd49
SHA12aa773882b2c9ebe3dff0861faf057f2f6699744
SHA2562571193afdedceb4b17cf54102898ecd3c8f50a211a12cf4354f4853863d9b39
SHA512cafa1ed1b1957916dfad8de71651402ed48d8969b1eebbc1588c0bd67729268954cab080d49a483289aa24ab0d75fb9e272861bf2c287f1777cf6d69edd92ab3
-
Filesize
55KB
MD5319c3629d9421d8678aed61b0d50d364
SHA1ea87d3e3eb441d20f2c8721d19869b80a96167b3
SHA25698f8dd40bed55cd6eaaf2f50a59f1ae3c9c0d254e76814e984fc0532432246d9
SHA512377961b6158ca2ec09ec7a02b6093e01c1a358a930e1278191543d674264e1d69a6ff8262aea551024692dd169db0f3af342fc5fc4f78c8b0d4cb94999ab32ad
-
Filesize
206KB
MD54c07207fad92eac078b8956305caee08
SHA1d3bcc6c6a2f1e6aeb00230c808e4e8306af045ec
SHA256dcbdeb138e9d7dcac6079841ca99e5ce0c947eb581148df311ca0124b2edcc3a
SHA512665c1eab4761b0e2eab9b8594d636d33f4bccc8f1197790f5d63e8c188832f1238e5789dff92990ce53169211022c68e4873478b892e18e4506cd7c100abcff8