Analysis
-
max time kernel
149s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe
-
Size
760KB
-
MD5
8f128e6c0c42bd73084daf6f42e79663
-
SHA1
26c5ebb8f7394f8d9a46b7b5cc13fddcdb786535
-
SHA256
06d0053abd5c3b62b77f18d22db7bb4646e26c1433cfbdfe76747195c23d5654
-
SHA512
229b8e7a5b1bcef6227dc9158b873730ce31e4e719861d1b63874c4f974a08e322e9622d70cd4e04a776a3001a356681edd093770762d18f84f77908b6a9b391
-
SSDEEP
12288:Yc4HGMupg4/8gsJwI7hJiCc9NNfftsAd/cYbQQNWQvviR1qxYNpl/RF0k3hf1Q5l:H4HGPyRdozvtryiQQNN3iR1n7HNhf1QH
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\wscsvc\Start = "4" regedit.exe -
Checks BIOS information in registry 2 TTPs 22 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion msnmsgr.exe -
Executes dropped EXE 20 IoCs
pid Process 2776 msnmsgr.exe 1760 msnmsgr.exe 4284 msnmsgr.exe 2516 msnmsgr.exe 4788 msnmsgr.exe 1504 msnmsgr.exe 2996 msnmsgr.exe 4672 msnmsgr.exe 320 msnmsgr.exe 3916 msnmsgr.exe 1644 msnmsgr.exe 1732 msnmsgr.exe 540 msnmsgr.exe 4836 msnmsgr.exe 1164 msnmsgr.exe 3864 msnmsgr.exe 532 msnmsgr.exe 1216 msnmsgr.exe 1980 msnmsgr.exe 4568 msnmsgr.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File opened for modification C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe File created C:\Windows\SysWOW64\msnmsgr.exe msnmsgr.exe -
System Location Discovery: System Language Discovery 1 TTPs 44 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msnmsgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\oahmsa = "Ragh`YgoqWUn\x7f_X~miJNK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNxmz}ilWKm~S[" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{QshO@xt\x7f^XJRXTLzk~SKq_r" msnmsgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94} 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJKAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{SshO@xt~oXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gfcPKNbrD = "RyDLJA~FzEEodixkI~" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\dsmciWxtfiv = "[sqdSRSF_^JjZBhp\x7fF_pjmSNeIn\\" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNwmz}ilUeuc}p" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\dsmciWxtfiv = "[sqdSRSF_^JjZBhp\x7fF_pjmSNeIn\\" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\dsmciWxtfiv = "[sqdSRSF_^JjZBhp\x7fF_pjmSNeIn\\" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{WshO@xt\x7f|XJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJGAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{]shO@xt~ZXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{^shO@xt}kXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\InProcServer32\ThreadingModel = "Both" 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{WshO@xt\x7fsXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNymz}ilUI`J]A" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{QshO@xt\x7fMXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{RshO@xt~oXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gfcPKNbrD = "RyDLJA~FzEEodixkI~" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{SshO@xt~xXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\dsmciWxtfiv = "[sqdSRSF_^JjZBhp\x7fF_pjmSNeIn\\" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gfcPKNbrD = "RyDLJA~FzEEodixkI~" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gfcPKNbrD = "RyDLJA~FzEEodixkI~" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\lycWaMkjlzs = "jfTuilaqTuHtQJS_rb|XvrU^W" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJLAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJIAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNzmz}ilWDwMwe" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNw}z}ilWU\x7fu}M" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\InProcServer32\ = "C:\\Windows\\SysWOW64\\Windows.Media.Devices.dll" 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{PshO@xt\x7fMXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\oahmsa = "Ragh`YgoqWUn\x7f_X~miJNK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNu}z}ilWCuTGP" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{^shO@xt~ZXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{PshO@xt\x7fMXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNtmz}ilWqrvIw" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\lycWaMkjlzs = "jfTuilaqTuHtQJS_rb|XvrU^W" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{QshO@xt\x7f^XJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{RshO@xt\x7f^XJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJFAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJEAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN\x7fMz}ilUvC}\x7fn" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{\\shO@xt~IXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gfcPKNbrD = "RyDLJA~FzEEodixkI~" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN|}z}ilUmRofB" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN~mz}ilWVbZ^M" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\dsmciWxtfiv = "[sqdSRSF_^JjZBhp\x7fF_pjmSNeIn\\" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJMAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{WshO@xt\x7f|XJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN~}z}ilUfhL^p" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNyMz}ilWL|GcV" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNxMz}ilWEagQM" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN{mz}ilVJjERd" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\oahmsa = "Ragh`YgoqWUn\x7f_X~miJNK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN\x7f]z}ilWFUX\\\x7f" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gclO = "h]OW~sgF~~NFJNAYIK" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkNx}z}ilU{ghSf" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{]shO@xt~IXJRXTLzk~SKq_r" msnmsgr.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\InProcServer32 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\irfI = "ZPkN~Mz}ilWNNzdY" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{RshO@xt~oXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\zazwexxlja = "P\\{SshO@xt~xXJRXTLzk~SKq_r" msnmsgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4B073A7A-C6B4-DF66-7453-AF12D7859F94}\gfcPKNbrD = "RyDLJA~FzEEodixkI~" msnmsgr.exe -
Runs .reg file with regedit 11 IoCs
pid Process 796 regedit.exe 4184 regedit.exe 1528 regedit.exe 5108 regedit.exe 1808 regedit.exe 1608 regedit.exe 4012 regedit.exe 1424 regedit.exe 3004 regedit.exe 1832 regedit.exe 1832 regedit.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: 33 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Token: 33 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe Token: 33 1760 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1760 msnmsgr.exe Token: 33 1760 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1760 msnmsgr.exe Token: 33 2516 msnmsgr.exe Token: SeIncBasePriorityPrivilege 2516 msnmsgr.exe Token: 33 2516 msnmsgr.exe Token: SeIncBasePriorityPrivilege 2516 msnmsgr.exe Token: 33 1504 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1504 msnmsgr.exe Token: 33 1504 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1504 msnmsgr.exe Token: 33 4672 msnmsgr.exe Token: SeIncBasePriorityPrivilege 4672 msnmsgr.exe Token: 33 4672 msnmsgr.exe Token: SeIncBasePriorityPrivilege 4672 msnmsgr.exe Token: 33 3916 msnmsgr.exe Token: SeIncBasePriorityPrivilege 3916 msnmsgr.exe Token: 33 3916 msnmsgr.exe Token: SeIncBasePriorityPrivilege 3916 msnmsgr.exe Token: 33 1732 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1732 msnmsgr.exe Token: 33 1732 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1732 msnmsgr.exe Token: 33 4836 msnmsgr.exe Token: SeIncBasePriorityPrivilege 4836 msnmsgr.exe Token: 33 4836 msnmsgr.exe Token: SeIncBasePriorityPrivilege 4836 msnmsgr.exe Token: 33 3864 msnmsgr.exe Token: SeIncBasePriorityPrivilege 3864 msnmsgr.exe Token: 33 3864 msnmsgr.exe Token: SeIncBasePriorityPrivilege 3864 msnmsgr.exe Token: 33 1216 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1216 msnmsgr.exe Token: 33 1216 msnmsgr.exe Token: SeIncBasePriorityPrivilege 1216 msnmsgr.exe Token: 33 4568 msnmsgr.exe Token: SeIncBasePriorityPrivilege 4568 msnmsgr.exe Token: 33 4568 msnmsgr.exe Token: SeIncBasePriorityPrivilege 4568 msnmsgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 4984 wrote to memory of 1724 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 88 PID 4984 wrote to memory of 1724 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 88 PID 4984 wrote to memory of 1724 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 88 PID 4424 wrote to memory of 4984 4424 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 84 PID 1724 wrote to memory of 1832 1724 cmd.exe 89 PID 1724 wrote to memory of 1832 1724 cmd.exe 89 PID 1724 wrote to memory of 1832 1724 cmd.exe 89 PID 4984 wrote to memory of 2776 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 90 PID 4984 wrote to memory of 2776 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 90 PID 4984 wrote to memory of 2776 4984 8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe 90 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 1760 wrote to memory of 1436 1760 msnmsgr.exe 92 PID 1760 wrote to memory of 1436 1760 msnmsgr.exe 92 PID 1760 wrote to memory of 1436 1760 msnmsgr.exe 92 PID 2776 wrote to memory of 1760 2776 msnmsgr.exe 91 PID 1436 wrote to memory of 4012 1436 cmd.exe 93 PID 1436 wrote to memory of 4012 1436 cmd.exe 93 PID 1436 wrote to memory of 4012 1436 cmd.exe 93 PID 1760 wrote to memory of 4284 1760 msnmsgr.exe 101 PID 1760 wrote to memory of 4284 1760 msnmsgr.exe 101 PID 1760 wrote to memory of 4284 1760 msnmsgr.exe 101 PID 4284 wrote to memory of 2516 4284 msnmsgr.exe 102 PID 4284 wrote to memory of 2516 4284 msnmsgr.exe 102 PID 4284 wrote to memory of 2516 4284 msnmsgr.exe 102 PID 4284 wrote to memory of 2516 4284 msnmsgr.exe 102 PID 4284 wrote to memory of 2516 4284 msnmsgr.exe 102 PID 4284 wrote to memory of 2516 4284 msnmsgr.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"2⤵
- Checks BIOS information in registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1832
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1424 "C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1424 "C:\Users\Admin\AppData\Local\Temp\8f128e6c0c42bd73084daf6f42e79663_JaffaCakes118.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4012
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1480 "C:\Windows\SysWOW64\msnmsgr.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1480 "C:\Windows\SysWOW64\msnmsgr.exe"6⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2516 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1424
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1504 "C:\Windows\SysWOW64\msnmsgr.exe"7⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4788 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1504 "C:\Windows\SysWOW64\msnmsgr.exe"8⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1832
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1512 "C:\Windows\SysWOW64\msnmsgr.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1512 "C:\Windows\SysWOW64\msnmsgr.exe"10⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4672 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:4528 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:796
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1524 "C:\Windows\SysWOW64\msnmsgr.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:320 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1524 "C:\Windows\SysWOW64\msnmsgr.exe"12⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3916 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat13⤵
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg14⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:4184
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1356 "C:\Windows\SysWOW64\msnmsgr.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1356 "C:\Windows\SysWOW64\msnmsgr.exe"14⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1732 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat15⤵
- System Location Discovery: System Language Discovery
PID:4944 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg16⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1528
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1484 "C:\Windows\SysWOW64\msnmsgr.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1484 "C:\Windows\SysWOW64\msnmsgr.exe"16⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat17⤵
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg18⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:5108
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1548 "C:\Windows\SysWOW64\msnmsgr.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1164 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1548 "C:\Windows\SysWOW64\msnmsgr.exe"18⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat19⤵
- System Location Discovery: System Language Discovery
PID:4312 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg20⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3004
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1572 "C:\Windows\SysWOW64\msnmsgr.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:532 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1572 "C:\Windows\SysWOW64\msnmsgr.exe"20⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat21⤵
- System Location Discovery: System Language Discovery
PID:3724 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg22⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1808
-
-
-
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1584 "C:\Windows\SysWOW64\msnmsgr.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\msnmsgr.exeC:\Windows\system32\msnmsgr.exe 1584 "C:\Windows\SysWOW64\msnmsgr.exe"22⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c c:\a.bat23⤵
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg24⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1608
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD5d085cde42c14e8ee2a5e8870d08aee42
SHA1c8e967f1d301f97dbcf252d7e1677e590126f994
SHA256a15d5dfd655de1214e0aae2292ead17eef1f1b211d39fac03276bbd6325b0d9f
SHA512de2cebd45d3cf053df17ae43466db6a8b2d816bf4b9a8deb5b577cfedf765b5dcdc5904145809ad3ca03ccff308f8893ec1faa309dd34afcab7cc1836d698d7b
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
1KB
MD55002319f56002f8d7ceacecf8672ce25
SHA13b26b6801be4768cc7582e29bc93facdf2a74be3
SHA256f23f4854d17525744e8028db6dde6eb7d5d664b0ee1b08870c9c01b639e0124c
SHA5128eae0fabc7f5a7e452abacf988a3632874c556af409da5e60c5e529524732b40f22d4e1d860ccceae87642875c819fc8a8120eceaabd25861f920c8c066a9aef
-
Filesize
1011B
MD55088b4be1b90717121e76c1fc33c033a
SHA1090676b012c30e6b0d6493ca1e9a31f3093cad6f
SHA256d1d8c8ac4136082ac60938e8148c43d81fa91a124eccf34048e629d22daeef3a
SHA5120cac2dcf138b1a66f857a54c92afe467ef7544655cd1c4aec3b4084c92c9186d9ba10e0e74a54a6e43e676068d3747f668f7286d44fcefce7ee4d385a3a96962
-
Filesize
1KB
MD5bf7ee07851e04b2a0dbe554db62dc3aa
SHA1cad155b66053cd7ce2b969a0eb20a8f4812b1f46
SHA25613dc8dc70b7bb240f6f4cf6be5ff0ec55c606267a328bb9c9e34e5fa70cce0d9
SHA5129ed79305c81287cf01d0138d87c6ec981b5bdd9195c56f8def4c74fdbc9b4816661d084fc1314f99b40102945b61d05121f4eaadec6403d4295a80847b797bc4
-
Filesize
2KB
MD5d8be0d42e512d922804552250f01eb90
SHA1cda2fd8fc9c4cdf15d5e2f07a4c633e21d11c9d3
SHA256901619f668fe541b53d809cd550460f579985c3d2f3d899a557997e778eb1d82
SHA512f53619e1ec3c9abc833f9fca1174529fb4a4723b64f7560059cd3147d74ea8fe945a7bd0034f6fb68c0e61b6782a26908d30a749a256e019031b5a6ac088eb97
-
Filesize
3KB
MD55aa228bc61037ddaf7a22dab4a04e9a1
SHA1b50fcd8f643ea748f989a06e38c778884b3c19f2
SHA25665c7c12f00303ec69556e7e108d2fb3881b761b5e68d12e8ae94d80ab1fd7d8b
SHA5122ac1a9465083463a116b33039b4c4014433bda78a61e6312dde0e8f74f0a6a6881017041985871badee442a693d66385fe87cbfc60f1309f7a3c9fb59ec6f2aa
-
Filesize
784B
MD55a466127fedf6dbcd99adc917bd74581
SHA1a2e60b101c8789b59360d95a64ec07d0723c4d38
SHA2568cd3b8dd28ac014cf973d9ab4b03af1c274bbc9b5ee0ee4ab8af0bdb01573b84
SHA512695cafc932bc8f0a514bc515860cb275297665de63ca3394b55f42c457761ebf654d29d504674681a77b34e3356a469e8c5b97ff7efc24de330d5375f025cba5
-
Filesize
2KB
MD5501effddf60a974e98b67dc8921aa7e8
SHA1734dfe4b508dbc1527ec92e91821a1251aec5b2e
SHA256672e3c47827c2fc929fc92cd7d2a61d9ba41e847f876a1e5486e2701cbc3cb06
SHA51228081046c5b0eb6a5578134e19af2a447d38afda338bd3ae4c2fc0054460580d47f9ab6d8c9001ff605e76df462e7bbcab80be15deaf3ca6264e20717dfb9c1c
-
Filesize
3KB
MD57fe70731de9e888ca911baeb99ee503d
SHA10073da5273512f66dbf570580dc55957535c2478
SHA256ec8ce13a4cab475695329eddc61ff2eee378e79f0d2f9ca3a9bc7b18bd52b89a
SHA5124421df7085fd2aac218d5544152d77080b99c1eaa24076975a6b1bb01149a19a1c0d6cc2c042cd507b37af9a220e7ce1f026103cdabfaec5994b1533c2f3eeac
-
Filesize
1KB
MD53637baf389a0d79b412adb2a7f1b7d09
SHA1f4b011a72f59cf98a325f12b7e40ddd0548ccc16
SHA256835336f5d468ac1d8361f9afbc8e69ff1538c51b0b619d641b4b41dcfaa39cba
SHA512ea71a49c3673e9ce4f92d0f38441b3bc5b3b9ef6649caa21972648e34b6cec8694fa8fb7fc0ddad1e58f0464e0ba917c4500090a3db3fc07e1d258079c1c2506
-
Filesize
2KB
MD5fa83299c5a0d8714939977af6bdafa92
SHA146a4abab9b803a7361ab89d0ca000a367550e23c
SHA256f3bb35f7fc756da2c2297a100fa29506cb12371edb793061add90ee16318bf03
SHA51285e46b9f1089054e60c433459eea52bec26330f8b91879df3b48db1533a307443dd82006ac3bb86245bbd207c1d8c75c29949f755cc0dc262ede888a1d531599
-
Filesize
113B
MD54fc73d2a3c107fa2cbc47157af62583e
SHA1ba3de0c5c5a8bd796b81e70e902e7a15070ef3b7
SHA256325582cc2b96526f10d01c66b6e9c5e963f419357cf1e175a7b3852c39d38ef3
SHA512c29c0b358f96c8eb7c43ec86356af6427d83a1da57eb148a2faff442931da00e6f0f41a751dbf1c47e507c8e52a5b8185fe6eea804aebf6f90259bbe06478d46
-
Filesize
113B
MD5e49cbcfd86033ec08441ef167e7fb714
SHA1010bc49dce8b0b12f0734eaab7fb903aabcbf646
SHA2564584533c7dec16cff6d0593f7963c6cef2639e9f02b53342104564993e1ac07d
SHA51246cce53dc117cee0895b90cb6155e16f402381d2fe947495f851ab014fe21b5af303c9a7a86996aa098d9a69b087cd04316b719b12cc64949ac37e473e1983af
-
Filesize
113B
MD525f0c1942df173dacfec677273069085
SHA1bd023d639f008f331f28da6d51787b94d19d4d43
SHA256ccc690db6419202e84ae6cd7a4221382f0e3c6a2ba8a071c02268aed8d9659be
SHA512f80ce0aa047b72b528f2928997733488826ab69bd6deedc715b00cd0a2df0f47163755db2fb4ecfa625400ec54843b5a5326d1a12faccef983c7541eaef34ec7
-
Filesize
113B
MD504ee0608b4a12575db05f1fef28746fe
SHA1825b189e1db63e890d8fdc029412f08e5601dc07
SHA256f2a823b29e54fb252b038766a65e2fd1ec9298b98c3bfb069ec7e1f53bef5387
SHA51290f0d5724cc521fc7b224e1279533f60c5debf39d8c5f95bc2a432eabb8256a619e80da559973ded3663b94b2a1cfb968ca72de651134b0f27439505424f554a
-
Filesize
113B
MD534c3a2a6d09dcc3d48843fae4a38dbc9
SHA1b202130541b6d96331b0ddb5e17cdbdf840bdeb8
SHA256d390715324cccb9593fa877e9d94ce21a6e6838897e30752a890d0456226977d
SHA51225443d1ed83bca9c7cf11734eb36b7e0244e65f0867bd088cc5f87177ce895f98950bd64152cfa69b4dc4b14cb6c1b26889e064bdfbf74f2c59b0c62c010832f
-
Filesize
113B
MD55f876d649321300d803a3b5582dcb76b
SHA1ce5559609adccde3683221886e103d55d2bea2e3
SHA256da5af8ca7376a019130871105e1efa929337d58b6bd005035121e5d6d06b4daa
SHA512a6e4b6e99ef41ad6d5086130ec56a32ac3329049e30d6486afecd81913e0fcbe80241c9a20d74933474dd9812c0240c2289e033b53fe01a8b342a49e50d4e976
-
Filesize
113B
MD5292aabc8163b68309bb4f29742677ff4
SHA11a03e07b10d5ae573699e224f214703fc792f1f2
SHA25637ff821e54501d412e9a8d8d0f796535f69722670ece5981fc0f57b15409c9a3
SHA512caf735bd963440602d11ab586e3009f444b062aedfc84e9be8f28a1f3944ae94cc70cfaf83cf8eb2f9a1b6d6dac706affdd5f711ac57636ac1ece5b130b04806
-
Filesize
113B
MD506c3b4af068844143c60afa970dda9fe
SHA1ddcb509c7e75178b66f05f6427686c51ef59bee0
SHA256bc39cc6d6bd5335d81ecc3dd83067a487f546713c80d78c34127c6b36583d7ff
SHA512d5840cf22c9af6c937264807675689c400fde6113cd93b2de855671709d5a0387682dad48f25ee7eda58c58fbbb23a5887e71754677907db6bb04857938f4477
-
Filesize
113B
MD5fb081935bdfb90023445deb8eeb679df
SHA1e448655759d50a7258455a843df4de8a0e8adb53
SHA256916b2db930e0b2d6bd5caaa90245e1e32f8c7871ee936eb9bc0f8cb43755b963
SHA51252feb654ff02aa19026dac4148bf19572ea19038e44000680290eef283e7474b5fceaea970a36ec1326f33220d33a5939543cf336f86457b291bd63524887bf7
-
Filesize
760KB
MD58f128e6c0c42bd73084daf6f42e79663
SHA126c5ebb8f7394f8d9a46b7b5cc13fddcdb786535
SHA25606d0053abd5c3b62b77f18d22db7bb4646e26c1433cfbdfe76747195c23d5654
SHA512229b8e7a5b1bcef6227dc9158b873730ce31e4e719861d1b63874c4f974a08e322e9622d70cd4e04a776a3001a356681edd093770762d18f84f77908b6a9b391
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904