Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 23:59
Static task
static1
Behavioral task
behavioral1
Sample
916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe
-
Size
668KB
-
MD5
916bd1bf4bc489ea1fe45061d0f7210d
-
SHA1
07768f49507099f013f989b4536635a655f57660
-
SHA256
d81e62234e9763b36a8f4acac3d8f4f2061d6140d1775ddd55164b4e8197be59
-
SHA512
00f72fbb46396395b2a34790728ba23ad556e1353fa8934e42dd2212d992f5343fa65d122b672c0e728c3e2a3e6bb21fc35577d74840656c698fd3266db50e2d
-
SSDEEP
12288:POqBSJNJ/+EkGz1lr3nxGteN4r3t8UOGz624SitfLmygYiW:2CScE7z193Rit8UJ62BmhgLW
Malware Config
Extracted
xtremerat
yahoomail.3utilities.com
Signatures
-
Detect XtremeRAT payload 12 IoCs
resource yara_rule behavioral1/memory/2804-19-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2804-15-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2804-13-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2804-11-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2804-5-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2804-3-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2804-8-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2608-29-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/1932-33-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/1932-35-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/1932-41-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/1932-47-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 14 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Config.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" Config.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" Config.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Config.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} Config.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2}\StubPath = "C:\\updater\\Config.exe restart" Config.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{5460C4DF-B266-909E-CB58-E32B79832EB2} 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe -
Executes dropped EXE 16 IoCs
pid Process 1688 Config.exe 1656 Config.exe 2236 Config.exe 3012 Config.exe 1964 Config.exe 596 Config.exe 1092 Config.exe 1664 Config.exe 2528 Config.exe 812 Config.exe 2748 Config.exe 2668 Config.exe 2756 Config.exe 2576 Config.exe 1676 Config.exe 2188 Config.exe -
Loads dropped DLL 9 IoCs
pid Process 1932 explorer.exe 1932 explorer.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\User Pinned\TaskBar\desktop.ini explorer.exe -
Suspicious use of SetThreadContext 12 IoCs
description pid Process procid_target PID 2668 set thread context of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 1688 set thread context of 2236 1688 Config.exe 35 PID 1656 set thread context of 3012 1656 Config.exe 36 PID 2236 set thread context of 1548 2236 Config.exe 37 PID 1964 set thread context of 1664 1964 Config.exe 41 PID 596 set thread context of 2528 596 Config.exe 42 PID 1092 set thread context of 812 1092 Config.exe 43 PID 1664 set thread context of 1724 1664 Config.exe 44 PID 2748 set thread context of 2576 2748 Config.exe 48 PID 2668 set thread context of 1676 2668 Config.exe 49 PID 2756 set thread context of 2188 2756 Config.exe 50 PID 2576 set thread context of 1332 2576 Config.exe 51 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 23 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Config.exe -
Modifies registry class 10 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff explorer.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 1548 explorer.exe 1724 explorer.exe 1332 explorer.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1932 explorer.exe -
Suspicious use of SendNotifyMessage 1 IoCs
pid Process 1932 explorer.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1932 explorer.exe 1548 explorer.exe 1548 explorer.exe 1724 explorer.exe 1724 explorer.exe 1332 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2668 wrote to memory of 2804 2668 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2608 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 31 PID 2804 wrote to memory of 2608 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 31 PID 2804 wrote to memory of 2608 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 31 PID 2804 wrote to memory of 2608 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 31 PID 2804 wrote to memory of 2608 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 31 PID 2804 wrote to memory of 1932 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1932 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1932 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1932 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 32 PID 2804 wrote to memory of 1932 2804 916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe 32 PID 1932 wrote to memory of 1688 1932 explorer.exe 33 PID 1932 wrote to memory of 1688 1932 explorer.exe 33 PID 1932 wrote to memory of 1688 1932 explorer.exe 33 PID 1932 wrote to memory of 1688 1932 explorer.exe 33 PID 2608 wrote to memory of 1656 2608 svchost.exe 34 PID 2608 wrote to memory of 1656 2608 svchost.exe 34 PID 2608 wrote to memory of 1656 2608 svchost.exe 34 PID 2608 wrote to memory of 1656 2608 svchost.exe 34 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1688 wrote to memory of 2236 1688 Config.exe 35 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 1656 wrote to memory of 3012 1656 Config.exe 36 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2236 wrote to memory of 1548 2236 Config.exe 37 PID 2608 wrote to memory of 1964 2608 svchost.exe 38 PID 2608 wrote to memory of 1964 2608 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\916bd1bf4bc489ea1fe45061d0f7210d_JaffaCakes118.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3012
-
-
-
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1964 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1724
-
-
-
-
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:596 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2528
-
-
-
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1092 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:812
-
-
-
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2748 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1332
-
-
-
-
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2668 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2756 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188
-
-
-
-
C:\Windows\SysWOW64\explorer.exeexplorer.exe3⤵
- Loads dropped DLL
- Drops desktop.ini file(s)
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\updater\Config.exe"C:\updater\Config.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\updater\Config.exeC:\updater\Config.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1548
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD528b92d0b57db85ea0a13c5ebe53f9a38
SHA1b44c1a59147be8614fb0efd76523a0d6bd266626
SHA256dcf0eaaf79af71f084c0a5b055b5dd4558cd195234dbeee3f5bcea72e77bf9f8
SHA512723998a5da5f160c2a9d6e8ef345f08c844de992584ab02bd2da6e646cdf31a2f85193e701614c415fb8bdc82104b32ee67834f5f3c1caa584382251b9e35e69
-
Filesize
2B
MD584cad01fdb44ae58dbe6c3973dcd87f5
SHA14700b42849fb35be323774820bf1bc8019d26c80
SHA2568b1f194be530240c18bf0b1ee0d038e750fab8b24c6bd25c864297e5ebb41fa6
SHA5126e10d3ec4724c1aca9ff3f6a26292ba80065d18e8e9395f1474c0a298008f25e312e2f7024e7d10aab3264764e69a25553cc20afd23090f83921d20e42b989ab
-
Filesize
343KB
MD56426d400c96fb9ffef4eaa54f6647f4c
SHA170a37871aff432790b6adf7d3fc4eb929476e082
SHA25698bba0cf4c57ecd35b227f45e4aa6dd50ef7cfb1160235cc14687c96eb09fa3c
SHA5122c8b4d3ab066cbfca6cf0c8d89d5044152b5e3d7100249cbedd1c816e3a4a94efc8bc6b79c1dab4bdf96e3ce476d6caccf625cfbe0aff3bf5e7a29dfcfa948c5
-
Filesize
668KB
MD5916bd1bf4bc489ea1fe45061d0f7210d
SHA107768f49507099f013f989b4536635a655f57660
SHA256d81e62234e9763b36a8f4acac3d8f4f2061d6140d1775ddd55164b4e8197be59
SHA51200f72fbb46396395b2a34790728ba23ad556e1353fa8934e42dd2212d992f5343fa65d122b672c0e728c3e2a3e6bb21fc35577d74840656c698fd3266db50e2d