Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 18:16
Static task
static1
Behavioral task
behavioral1
Sample
438b904a47606eb7014625cafce93402_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
438b904a47606eb7014625cafce93402_JaffaCakes118.exe
-
Size
941KB
-
MD5
438b904a47606eb7014625cafce93402
-
SHA1
064b7d60d5599d11a2594bf375722b0eb928810c
-
SHA256
865e33fcc9b37a6996eafba738453bf597e8c981288cc00607a64de222cce501
-
SHA512
4fcdce0301dde956c96d0f6b2034d75c00bae15e542384282ebad379039a7d7edf79563ea76b2f3c0ab6340cb45976730344226daa30283fead5e438aecdf4ca
-
SSDEEP
24576:KoCO4OOw/MZSu9hGJFo9IyaDnGSFJ/nUmqUta5ct9nmU4:KDO4Od/k4bdyaievTZt9m
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 2756 spools.exe 2644 lqbzse.exe 2712 syseter.exe 2584 svehost.exe 2492 selvice.exe 2516 svehost.exe 2964 explor.exe 1736 llly99.exe 1896 setup.exe 1816 zwtpm.exe 2660 adgkn.exe 2820 adgkn.exe 2272 zwtpm.exe -
Loads dropped DLL 64 IoCs
pid Process 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2644 lqbzse.exe 2644 lqbzse.exe 2644 lqbzse.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2756 spools.exe 2756 spools.exe 2756 spools.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2712 syseter.exe 2712 syseter.exe 2712 syseter.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2584 svehost.exe 2584 svehost.exe 2584 svehost.exe 2492 selvice.exe 2492 selvice.exe 2492 selvice.exe 2584 svehost.exe 2516 svehost.exe 2516 svehost.exe 2516 svehost.exe 2964 explor.exe 2964 explor.exe 2964 explor.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 1736 llly99.exe 1736 llly99.exe 1736 llly99.exe 1736 llly99.exe 1896 setup.exe 1896 setup.exe 1896 setup.exe 2076 regsvr32.exe 1248 regsvr32.exe 1876 rundll32.exe 1876 rundll32.exe 1876 rundll32.exe 1876 rundll32.exe 1896 setup.exe 1896 setup.exe 1816 zwtpm.exe 1816 zwtpm.exe 1816 zwtpm.exe 2964 explor.exe 2964 explor.exe 2964 explor.exe 2964 explor.exe 1896 setup.exe 1896 setup.exe 2660 adgkn.exe 2660 adgkn.exe 2660 adgkn.exe 2820 adgkn.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000\Software\Microsoft\Windows\CurrentVersion\Run\Messenger = "c:\\windows\\messenger\\messenger.exe" syseter.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\JSsetup = "c:\\windows\\system\\jssetup\\JSsetup.exe" syseter.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{451B9F14-A525-45BB-A6EE-4B5A61323B35} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\ = "WebSafeCenter Class" regsvr32.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 zwtpm.exe -
Drops file in System32 directory 13 IoCs
description ioc Process File created C:\Windows\SysWOW64\try5831.dll spools.exe File created C:\Windows\SysWOW64\dllcache\try5831.dll spools.exe File created C:\Windows\SysWOW64\ffcifile.dll spools.exe File created C:\Windows\SysWOW64\ugkmrk.bat selvice.exe File created C:\Windows\SysWOW64\jtpilluzg.bat selvice.exe File opened for modification C:\Windows\SysWOW64\s3d332.dat explor.exe File opened for modification \??\c:\windows\SysWOW64\temp.dll syseter.exe File opened for modification C:\Windows\SysWOW64\mssrcid.ini setup.exe File created C:\Windows\SysWOW64\Windows.ime explor.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat adgkn.exe File opened for modification C:\Windows\SysWOW64\Web.ini rundll32.exe File opened for modification C:\Windows\SysWOW64\mssrcid.ini zwtpm.exe File opened for modification C:\Windows\SysWOW64\mssrcid.ini adgkn.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2584 set thread context of 2516 2584 svehost.exe 38 -
resource yara_rule behavioral1/files/0x000800000001707e-12.dat upx behavioral1/memory/2372-11-0x00000000008A0000-0x00000000008DD000-memory.dmp upx behavioral1/memory/2756-27-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/files/0x0006000000018708-54.dat upx behavioral1/memory/2492-83-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2492-162-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/2756-182-0x0000000000400000-0x000000000043D000-memory.dmp upx behavioral1/memory/2756-200-0x0000000000400000-0x000000000043D000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification \??\c:\windows\messenger\messenger.exe syseter.exe File created \??\c:\windows\messenger\messenger.exe syseter.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 438b904a47606eb7014625cafce93402_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language lqbzse.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language spools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language selvice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwtpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language syseter.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svehost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explor.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adgkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adgkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language zwtpm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language llly99.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2952 cmd.exe 1668 PING.EXE 1624 PING.EXE -
Modifies data under HKEY_USERS 31 IoCs
description ioc Process Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content\CachePrefix adgkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History\CachePrefix = "Visited:" adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\UNCAsIntranet = "0" adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\WpadDecisionTime = 505acd59651edb01 adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8\WpadDecision = "0" adgkn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\WpadDecision = "0" adgkn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\7e-b1-0e-81-75-d8 adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8\WpadDecisionTime = 509aff41651edb01 adgkn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections adgkn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\ adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8\WpadDecisionReason = "1" adgkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8\WpadDetectedUrl adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000004000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\WpadDecisionTime = 509aff41651edb01 adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8\WpadDecisionTime = 505acd59651edb01 adgkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies\CachePrefix = "Cookie:" adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000005000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000003000000090000000000000000000000000000000400000000000000000000000000000000000000000000000000000001000000020000000a7f00c2000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 adgkn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6} adgkn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8 adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\7e-b1-0e-81-75-d8\WpadDecisionTime = d0201e3b651edb01 adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\AutoDetect = "1" adgkn.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings adgkn.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\WpadDecisionReason = "1" adgkn.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\WpadDecisionTime = d0201e3b651edb01 adgkn.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\{2913FCFD-2CB3-4157-AAA4-7299D461A6F6}\WpadNetworkName = "Network 3" adgkn.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad adgkn.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0\win32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\wssvr.EXE\AppID = "{7F45A535-2293-46A2-99A8-C8EA8DD22BC2}" adgkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\FLAGS regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\FLAGS\ = "0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ThunderSif.WebSafeCenter\CurVer\ = "ThunderSif.WebSafeCenter.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\Programmable regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\HELPDIR\ = "C:\\Windows\\SysWow64\\" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\VersionIndependentProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8A5AC234-9C15-4A34-919B-28D58785F7D8}\1.0\0\win32 adgkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ThunderSif.WebSafeCenter.1\ = "WebSafeCenter Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6C3433B1-83EB-4941-998B-06C918733770}\1.0\0\win32\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\Messenger\\ThunderSafe.dll" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1\ = "ATlMy Class" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CLSID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\ProgID\ = "ThunderSif.WebSafeCenter.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\ = "ATlMy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6C3433B1-83EB-4941-998B-06C918733770}\1.0\FLAGS\ = "0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\ProxyStubClsid32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{CE673B02-973C-4268-A819-DA005C782B5D}\1.0\ = "testAtl 1.0 Type Library" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\ = "{CE673B02-973C-4268-A819-DA005C782B5D}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\wssvr.EXE adgkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib\Version = "1.0" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8A5AC234-9C15-4A34-919B-28D58785F7D8}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\adgkn.exe" adgkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8A5AC234-9C15-4A34-919B-28D58785F7D8}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64\\" adgkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ProgID\ = "TestAtl.ATlMy.1" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6C3433B1-83EB-4941-998B-06C918733770}\1.0\HELPDIR regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\ = "ATlMy Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AppID\{7F45A535-2293-46A2-99A8-C8EA8DD22BC2}\LocalService = "wssvr" adgkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8A5AC234-9C15-4A34-919B-28D58785F7D8} adgkn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ThunderSif.WebSafeCenter.1\CLSID\ = "{451B9F14-A525-45BB-A6EE-4B5A61323B35}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6C3433B1-83EB-4941-998B-06C918733770}\1.0\ = "ThunderSif 1.0 Type Library" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\TypeLib\ = "{6C3433B1-83EB-4941-998B-06C918733770}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}\InprocServer32\ = "C:\\Windows\\SysWow64\\ffcifile.dll" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\TypeLib regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CLSID\ = "{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{6C3433B1-83EB-4941-998B-06C918733770}\1.0\0 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy.1\CLSID\ = "{C4560D12-CE25-4A2E-A5D4-B5070FCBE282}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CurVer\ = "TestAtl.ATlMy.1" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TestAtl.ATlMy\CurVer regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ThunderSif.WebSafeCenter\CurVer regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\TypeLib\Version = "1.0" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{F5CC5892-346B-4F19-B304-307DD1EF1A45}\TypeLib regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{8A5AC234-9C15-4A34-919B-28D58785F7D8}\1.0\0 adgkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ThunderSif.WebSafeCenter\CLSID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{451B9F14-A525-45BB-A6EE-4B5A61323B35}\ = "WebSafeCenter Class" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{21BC973C-66FC-4B79-B00E-51D69E7DBF8E}\ = "IWebSafeCenter" regsvr32.exe -
Runs net.exe
-
Runs ping.exe 1 TTPs 2 IoCs
pid Process 1668 PING.EXE 1624 PING.EXE -
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2712 syseter.exe 2712 syseter.exe 2964 explor.exe 2820 adgkn.exe 2820 adgkn.exe 2820 adgkn.exe 1876 rundll32.exe 2820 adgkn.exe 2820 adgkn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe Token: 33 1816 zwtpm.exe Token: SeIncBasePriorityPrivilege 1816 zwtpm.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2756 spools.exe 2712 syseter.exe 2712 syseter.exe 1816 zwtpm.exe 1816 zwtpm.exe 1816 zwtpm.exe 2272 zwtpm.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2756 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 31 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2644 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 32 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2712 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 33 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2584 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 34 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2372 wrote to memory of 2492 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 35 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2644 wrote to memory of 2952 2644 lqbzse.exe 36 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2372 wrote to memory of 2964 2372 438b904a47606eb7014625cafce93402_JaffaCakes118.exe 37 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38 PID 2584 wrote to memory of 2516 2584 svehost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\438b904a47606eb7014625cafce93402_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\438b904a47606eb7014625cafce93402_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\spools.exe"C:\Users\Admin\AppData\Local\Temp\spools.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32 /s C:\Windows\System32\ffcifile.dll3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1248
-
-
C:\Windows\SysWOW64\rundll32.exerundll32 try5831.dll , InstallMyDll3⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1876
-
-
C:\Windows\SysWOW64\cmd.execmd /c 375519961O57540.bat3⤵
- System Location Discovery: System Language Discovery
PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\lqbzse.exe"C:\Users\Admin\AppData\Local\Temp\lqbzse.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.execmd.exe /C ping.exe 127.0.0.1 & del "C:\Users\Admin\AppData\Local\Temp\lqbzse.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2952 -
C:\Windows\SysWOW64\PING.EXEping.exe 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1668
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\syseter.exe"C:\Users\Admin\AppData\Local\Temp\syseter.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\svehost.exe"C:\Users\Admin\AppData\Local\Temp\svehost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\svehost.exe"C:\Users\Admin\AppData\Local\Temp\svehost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\selvice.exe"C:\Users\Admin\AppData\Local\Temp\selvice.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\system32\jtpilluzg.bat3⤵
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\SysWOW64\PING.EXEping -n 3 127.0.0.14⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\explor.exe"C:\Users\Admin\AppData\Local\Temp\explor.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2964
-
-
C:\Users\Admin\AppData\Local\Temp\llly99.exe"C:\Users\Admin\AppData\Local\Temp\llly99.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Messenger\setup.exe"C:\Users\Admin\AppData\Local\Temp\Messenger\setup.exe" llly3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\zwtpm.exeC:\Windows\system32\zwtpm.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1816
-
-
C:\Windows\SysWOW64\adgkn.exe"C:\Windows\system32\adgkn.exe" /service4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2660
-
-
C:\Windows\SysWOW64\net.exenet start Comeventps4⤵
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 start Comeventps5⤵
- System Location Discovery: System Language Discovery
PID:2728
-
-
-
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32 "C:\Users\Admin\AppData\Local\Temp\Messenger\ThunderSafe.dll" /s3⤵
- Loads dropped DLL
- Installs/modifies Browser Helper Object
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2076
-
-
-
C:\Windows\SysWOW64\adgkn.exeC:\Windows\SysWOW64\adgkn.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\zwtpm.exe"C:\Windows\SysWOW64\zwtpm.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2272
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Browser Extensions
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5940ca2e852210dd0872ab75bec1addd0
SHA10dbe38290db000c0a8b799d76757b08d93dd1a20
SHA256a5b770b308595e60dc9d1bef309f7644a588acbbe58757ab1b0093f3cbd6b5fb
SHA512ca1880398c17ae9208e98663a8a143035624700b57482b419e995526ace1d497f25383e75e3d2730d2a05d8ed0c3dbd2fc128df79266152f4d1d53f344295eb7
-
Filesize
64KB
MD5d81f3cbf6c783710fd329acaeb62c11e
SHA16c234055592ea63431b51a96d2604800b9a659a1
SHA2569d5c34bda05603f6e283b76c0a55179ea548349117363ba719a10d19d930b819
SHA5128a034efe5601e4c48000c2ff2ff14db95b0a1c748cb2ed2e2f06adcb21b5d43af92f613379da803c226c7ed2e15d9c6300f1b42f76ab041d12f8ed8b38d879fc
-
Filesize
76KB
MD503eed954eb652553833bc37789eb7ea8
SHA181902061f69267aeaed071e6350d4175cc09efb2
SHA256d431163e1e279add41454e1775224522bfc504ae8f48713d8ce339485b0418e3
SHA512eee85107ee564b390f7532e17081e3ff41c59d3cdead5c3d7a276e509df4d7c81365727ac75ca637f14a3a63d048b6dcd3bcd1763fec4b1ff306e0b256e119b3
-
Filesize
64KB
MD5cc04edaa32516285bcf38748de8178d7
SHA1ad6a0a6a3b2474f2a2e112c1cd1e6e423b89063d
SHA2566b831bc318f65ad40e1167168b911eb287e54688ea490f2787cbcb2a37468aa2
SHA51282b5e21c7d8f42231264c06d318913f51f742c2f9344aa4405b6d5880a379fe58e9828f6bebdf5fe014b9fac9ee6359f57c385a2e2e214a07d91ca398b9fd52b
-
Filesize
100B
MD516b8d95406120fe1822a5feb0afb9d5c
SHA170bc41829b485313a2069e164cb426d478471fe6
SHA256dc4791faf83e81ec3676d6d0902b93d8b9a3fa32f01076a236a7a320646d1b00
SHA51285f217aac6fb3af21e828feba82910060508edf8b828ccb1b4ada06e279f4de9d536ae424f6f83d26049409d74021cfc966d173408681b37816a3cf5b056378c
-
Filesize
124B
MD5601084dcd00cf19cda4c028fd05f893e
SHA1f8bf40b53f13102e3b967cedc8bfa317833719c2
SHA2563ad0dc663672f4855528fafe372b612d0e3287025ede534bfb2587ccc0fa26a1
SHA51271c588ab1e00f5aa2c57fd15a9af2edc42f9c7ea07c01a4c0552103befd7519973ec356e64651f7b30741046b3a3a854d0bcdb81faf62eb1c53abf433db81d51
-
Filesize
20KB
MD5c12683fd67e76a66d1ba39ac22168925
SHA171f94e7f54d81fba8ce6ca9b3a6a6522cf16509e
SHA256bfbb15e180aea39014a0d272ebedb5d5a6d9c69d9984918a8c786de53c4b06f6
SHA512f4369e9206c1a14fa804f62e8c072cc7c9ba4c3da7341d7b7da559175da314d8f0a60931cd7587cf5a83d5b67b66ef15022a400e0280dd8d861900318f5104b4
-
Filesize
132KB
MD5cde45741b07efa0306ed1bfe449e4ef8
SHA10fa6a767e9e7a702597505e9c3df3704969f1147
SHA2567b90a225985d188ff8592828b688580609f0107d39d5225b7111606d8226da1c
SHA512ad98c6328f5d8d406090208a31483bd2a529aa4259a577d980a283d88868a0200060bc24d45a458a6d1a521e60504e782d7a37f101fda93a3fc9af5b144d76f7
-
Filesize
132KB
MD5a328e8d509296cf76a99ccf1034ed0ee
SHA17cb55bc2580fb0801e279134982c8ee8ed13df90
SHA2567a69c78e0778963e59760a4b48ee87ebc7d70d2de528d0afa283b0123897b283
SHA51220bba80316e4fd0bd300baa0d329bed4bb6ef75925a845c3309a73ed980ea3bf93ced57bcb111d6ae81edd548ded4a56ed1bdbb89f998939b690ee9fd21ed5cc
-
Filesize
68KB
MD512cf4395bf1f403eac6ee869a4ef2986
SHA13ff5e92318a07e7fadf2353034425fefcbdd1159
SHA2561dc2d790e98851a12d32d6133beff8ec087d3cbc07b0671b4c1012a29632a294
SHA512f61a798fd6325ab964d671dec7cf665aa84cc0798429abd1940888c34a045705ebfa572ec1b14a67f4bd5d3054d24ea1325e75601a02be46b8b59b9538325ce8
-
Filesize
30KB
MD5ecc341f2bf4f88c8fbf60ea10b5e4fed
SHA121a19153f5efa049ff24595dd296d718d7b93710
SHA25699692573fdff86d6eb11ab4f9062b5b35be53dd74d2937a9faf12ce53d26acc1
SHA512f82adbd04826941c741ee76f1b83425bda5edb9ad46de6d0950ce68a6dc166cfdc11b035547227dc1ee80eb0147450b9b3857cfc9471ea17b50767e10e8e3614
-
Filesize
60KB
MD56dfd42c8451da8aa8d62dc052e962cf3
SHA1976629d685068130c649dc2292d62c76a3cb15e4
SHA256f8d7c5e80202dd022ce4e1cf4a7e6eb9e68411c1b362c733ac9ba61d8d4a7cdf
SHA512894d2a0b8d16dfc51c9d11121e334975a600fdfa0e4813aee13ee8d12fa2c05a0cd71c3dc4fd1dab38a4c6eb37f0270f34f3ca5bffd02ed00f2ec8427ed0cdd9
-
Filesize
162KB
MD505a44e8ed157637048677b18431b8e3d
SHA1fd9793991710bb548b5f6b6f1346474334cdd69a
SHA256f5cc755162c2ee5f2cb887b8dd3c0b0f316e7830932c1047b082e884c99c0252
SHA5129af0ba8933b6365d366221c9a0b93c9a5fd7d530db61152220a651dfe97f527518d7e357b4049b441dba1fd3bf710a4165db9ba5fc9ee705b180e3c782bb4f61
-
Filesize
312KB
MD53ad35857a12ece3594ffd2ccd2c078eb
SHA1e65ba6692482a5d4119f22a22e671b8763fc801e
SHA2569a643d34f71e6d78428361aa8ba7c4cca2393b65ce6bb3b278388512d11e8331
SHA512cc6ab0e7e06b9ddb79d95cfd7d14bd3703cf8c47c8d6831dadfc4ce8df9ce68045282207cc50d9259e3a62ce9c719212108c3bccda9dfdf872022c9eae99a34a