Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/10/2024, 19:58
Behavioral task
behavioral1
Sample
43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe
-
Size
253KB
-
MD5
43ee537be1f1b94599352999ce0b0ac5
-
SHA1
1242eac60b7867c7162ec827559018d54c075afd
-
SHA256
e9af912b5faf9e3695362bfffbb0ad43a46e1d193b1a6c769409de32be19d8d5
-
SHA512
b9b6f8589cfe001678af503fb94efe5c033cccc93ece1e1e023c05a80fc917faec717610d3ca07918db903645e583103da14ba5e04ab111a7ad0c7010dbe25c3
-
SSDEEP
3072:Aej3f+jEMAPMMoUegs+rdFeLmH7QWsXMqLvIP75rTTK/h4KtBfqXKPRPRU6/OYqX:tWjEMAIUHs+rd4mb+DETTq7xPRU3P
Malware Config
Signatures
-
Modifies firewall policy service 3 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\%windir%/system32/type32.exe = "C:\\Windows\\system32\\type32.exe:*:Enabled:type32" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
Detected Nirsoft tools 1 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
resource yara_rule behavioral1/memory/2764-25-0x0000000000400000-0x000000000041B000-memory.dmp Nirsoft -
Executes dropped EXE 1 IoCs
pid Process 2764 ntkernelloader.exe -
Loads dropped DLL 6 IoCs
pid Process 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Keyboard Support = "C:\\WINDOWS\\system32\\type32.exe" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\mswinsck.ocx 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\ntkernelloader.exe 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe File created C:\Windows\SysWOW64\micdriverz.dll ntkernelloader.exe File created C:\Windows\SysWOW64\optrves.dll 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
resource yara_rule behavioral1/memory/1628-0-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/memory/1628-13-0x0000000000400000-0x0000000000441000-memory.dmp upx behavioral1/files/0x0004000000004ed7-15.dat upx behavioral1/memory/2764-24-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/2764-25-0x0000000000400000-0x000000000041B000-memory.dmp upx behavioral1/memory/1628-31-0x0000000000400000-0x0000000000441000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ntkernelloader.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Control 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\ = "0" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX, 1" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ = "IMSWinsockControl" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID\ = "MSWinsock.Winsock" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR\ 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\ = "Microsoft WinSock Control, version 6.0" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Programmable 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED4-2438-11CF-A3DB-080036F12502} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\HELPDIR 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CLSID 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\VersionIndependentProgID 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ProgID\ = "MSWinsock.Winsock.1" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\0\win32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\ = "Microsoft WinSock Control, version 6.0" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock\CurVer\ = "MSWinsock.Winsock.1" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\MSWinsock.Winsock.1\CLSID\ = "{248DD896-BB45-11CF-9ABC-0080C7E7B78D}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\MiscStatus\1\ = "132497" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A57-2BAA-11CF-A229-00AA003D7352} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\ = "Microsoft Winsock Control 6.0 (SP5)" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS\ = "2" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ThreadingModel = "Apartment" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{40FC6ED5-2438-11CF-A3DB-080036F12502} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{248DD890-BB45-11CF-9ABC-0080C7E7B78D}\1.0\FLAGS 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32\ = "C:\\Windows\\SysWow64\\MSWINSCK.OCX" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Implemented Categories\{0DE86A53-2BAA-11CF-A229-00AA003D7352} 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD897-BB45-11CF-9ABC-0080C7E7B78D}\ = "Winsock General Property Page Object" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\Version = "1.0" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ = "DMSWinsockControlEvents" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\Version\ = "1.0" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\ToolboxBitmap32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{248DD892-BB45-11CF-9ABC-0080C7E7B78D}\TypeLib\ = "{248DD890-BB45-11CF-9ABC-0080C7E7B78D}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{248DD893-BB45-11CF-9ABC-0080C7E7B78D}\ProxyStubClsid32\ = "{00020420-0000-0000-C000-000000000046}" 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{248DD896-BB45-11CF-9ABC-0080C7E7B78D}\InprocServer32 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2764 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2764 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2764 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 32 PID 1628 wrote to memory of 2764 1628 43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43ee537be1f1b94599352999ce0b0ac5_JaffaCakes118.exe"1⤵
- Modifies firewall policy service
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\ntkernelloader.exeC:\Windows\system32\ntkernelloader.exe /stext C:\Windows\system32\micdriverz.dll2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2764
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
106KB
MD53d8fd62d17a44221e07d5c535950449b
SHA16c9d2ecdd7c2d1b9660d342e2b95a82229486d27
SHA256eba048e3a9cb11671d0e3c5a0b243b304d421762361fe24fd5ea08cb66704b09
SHA512501e22a0f99e18f6405356184506bc5849adc2c1df3bdee71f2b4514ab0e3e36673b4aecbd615d24ebb4be5a28570b2a6f80bd52331edb658f7a5f5a9d686d10
-
Filesize
42KB
MD5ab39f2449e55cc3790e8233f188c0506
SHA14a5cb790d0b79d62897cc54621596e772ec60d7f
SHA256af33f86c8461c1abc08bb6e22b6be7a0e85121a095b6072ab9b9a6a3c36c5277
SHA512a5a02e723265f42b413060b41f0d9f3ec05826cb69b69a987a876b1737a94e68af21a435c4a5f69c791311b27a4933f594b7469dbf5ad4c1b92fe8b4944e45db