Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 11:04
Behavioral task
behavioral1
Sample
a788f0eb33517069a146fe6558878182_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a788f0eb33517069a146fe6558878182_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a788f0eb33517069a146fe6558878182_JaffaCakes118.exe
-
Size
130KB
-
MD5
a788f0eb33517069a146fe6558878182
-
SHA1
1b9b7017a6b590950a2153fbdbad6a772428cff0
-
SHA256
56322acab307399bc767b12dbd6dd779d2321d26565e2f34bf81753d3e561958
-
SHA512
1864fcd065beeacaaf7e5bdf695b641cd3156e2ad909aeabb708c05ec15da2b54f37cd04682eb2b36adfa7e4934917f8c0f24bd5c932a7b856d8886925995f9e
-
SSDEEP
3072:lDF378L22F9imS2/h1pldlDcNm4qRKWtel7GYTzujSout:lD5899hh1pfeA7RdskZSoS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2572 CtDrvMkn.exe -
Executes dropped EXE 51 IoCs
pid Process 2572 CtDrvMkn.exe 2832 CtDrvMkn.exe 2796 CtDrvMkn.exe 2624 CtDrvMkn.exe 2632 CtDrvMkn.exe 992 CtDrvMkn.exe 2896 CtDrvMkn.exe 2044 CtDrvMkn.exe 372 CtDrvMkn.exe 2668 CtDrvMkn.exe 2304 CtDrvMkn.exe 2192 CtDrvMkn.exe 1092 CtDrvMkn.exe 2328 CtDrvMkn.exe 568 CtDrvMkn.exe 2204 CtDrvMkn.exe 2188 CtDrvMkn.exe 1748 CtDrvMkn.exe 2388 CtDrvMkn.exe 2592 CtDrvMkn.exe 2768 CtDrvMkn.exe 2912 CtDrvMkn.exe 2016 CtDrvMkn.exe 2660 CtDrvMkn.exe 2640 CtDrvMkn.exe 2008 CtDrvMkn.exe 2864 CtDrvMkn.exe 2688 CtDrvMkn.exe 1100 CtDrvMkn.exe 2932 CtDrvMkn.exe 2596 CtDrvMkn.exe 2344 CtDrvMkn.exe 872 CtDrvMkn.exe 2284 CtDrvMkn.exe 316 CtDrvMkn.exe 1872 CtDrvMkn.exe 1780 CtDrvMkn.exe 2512 CtDrvMkn.exe 1184 CtDrvMkn.exe 2196 CtDrvMkn.exe 896 CtDrvMkn.exe 2548 CtDrvMkn.exe 2560 CtDrvMkn.exe 2772 CtDrvMkn.exe 2856 CtDrvMkn.exe 2808 CtDrvMkn.exe 1740 CtDrvMkn.exe 2792 CtDrvMkn.exe 572 CtDrvMkn.exe 928 CtDrvMkn.exe 2868 CtDrvMkn.exe -
Loads dropped DLL 64 IoCs
pid Process 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 2572 CtDrvMkn.exe 2572 CtDrvMkn.exe 2832 CtDrvMkn.exe 2832 CtDrvMkn.exe 2796 CtDrvMkn.exe 2796 CtDrvMkn.exe 2624 CtDrvMkn.exe 2624 CtDrvMkn.exe 2632 CtDrvMkn.exe 2632 CtDrvMkn.exe 992 CtDrvMkn.exe 992 CtDrvMkn.exe 2896 CtDrvMkn.exe 2896 CtDrvMkn.exe 2044 CtDrvMkn.exe 2044 CtDrvMkn.exe 372 CtDrvMkn.exe 372 CtDrvMkn.exe 2668 CtDrvMkn.exe 2668 CtDrvMkn.exe 2304 CtDrvMkn.exe 2304 CtDrvMkn.exe 2192 CtDrvMkn.exe 2192 CtDrvMkn.exe 1092 CtDrvMkn.exe 1092 CtDrvMkn.exe 2328 CtDrvMkn.exe 2328 CtDrvMkn.exe 568 CtDrvMkn.exe 568 CtDrvMkn.exe 2204 CtDrvMkn.exe 2204 CtDrvMkn.exe 2188 CtDrvMkn.exe 2188 CtDrvMkn.exe 1748 CtDrvMkn.exe 1748 CtDrvMkn.exe 2388 CtDrvMkn.exe 2388 CtDrvMkn.exe 2592 CtDrvMkn.exe 2592 CtDrvMkn.exe 2768 CtDrvMkn.exe 2768 CtDrvMkn.exe 2912 CtDrvMkn.exe 2912 CtDrvMkn.exe 2016 CtDrvMkn.exe 2016 CtDrvMkn.exe 2660 CtDrvMkn.exe 2660 CtDrvMkn.exe 2640 CtDrvMkn.exe 2640 CtDrvMkn.exe 2008 CtDrvMkn.exe 2008 CtDrvMkn.exe 2864 CtDrvMkn.exe 2864 CtDrvMkn.exe 2688 CtDrvMkn.exe 2688 CtDrvMkn.exe 1100 CtDrvMkn.exe 1100 CtDrvMkn.exe 2932 CtDrvMkn.exe 2932 CtDrvMkn.exe 2596 CtDrvMkn.exe 2596 CtDrvMkn.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 CtDrvMkn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe a788f0eb33517069a146fe6558878182_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe -
resource yara_rule behavioral1/memory/1292-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/files/0x00070000000120fe-4.dat upx behavioral1/memory/1292-13-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2572-17-0x00000000035F0000-0x000000000365B000-memory.dmp upx behavioral1/memory/2572-20-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2832-21-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2832-30-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2796-28-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2796-37-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-38-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2632-44-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2624-46-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2632-54-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/992-52-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/992-60-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2896-67-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2044-73-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/372-77-0x00000000030F0000-0x000000000315B000-memory.dmp upx behavioral1/memory/372-80-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2668-81-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2668-88-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2304-86-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2668-85-0x0000000003370000-0x00000000033DB000-memory.dmp upx behavioral1/memory/2192-94-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2304-96-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1092-100-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2192-102-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1092-108-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2328-113-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2204-118-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/568-120-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2204-125-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2188-124-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1748-130-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2188-132-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1748-135-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2592-136-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2388-138-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2768-139-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2592-141-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2768-143-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2912-145-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2016-146-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2660-148-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2640-150-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2864-153-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2008-152-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-158-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2864-156-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1100-161-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2688-160-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/1100-163-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2932-166-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2932-164-0x0000000003400000-0x000000000346B000-memory.dmp upx behavioral1/memory/2596-170-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2344-168-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2596-167-0x00000000030F0000-0x000000000315B000-memory.dmp upx behavioral1/memory/2344-171-0x0000000003210000-0x000000000327B000-memory.dmp upx behavioral1/memory/872-174-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2344-173-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2284-175-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/872-177-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/2284-179-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral1/memory/316-181-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 51 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 2572 CtDrvMkn.exe 2832 CtDrvMkn.exe 2796 CtDrvMkn.exe 2624 CtDrvMkn.exe 2632 CtDrvMkn.exe 992 CtDrvMkn.exe 2896 CtDrvMkn.exe 2044 CtDrvMkn.exe 372 CtDrvMkn.exe 2668 CtDrvMkn.exe 2304 CtDrvMkn.exe 2192 CtDrvMkn.exe 1092 CtDrvMkn.exe 2328 CtDrvMkn.exe 568 CtDrvMkn.exe 2204 CtDrvMkn.exe 2188 CtDrvMkn.exe 1748 CtDrvMkn.exe 2388 CtDrvMkn.exe 2592 CtDrvMkn.exe 2768 CtDrvMkn.exe 2912 CtDrvMkn.exe 2016 CtDrvMkn.exe 2660 CtDrvMkn.exe 2640 CtDrvMkn.exe 2008 CtDrvMkn.exe 2864 CtDrvMkn.exe 2688 CtDrvMkn.exe 1100 CtDrvMkn.exe 2932 CtDrvMkn.exe 2596 CtDrvMkn.exe 2344 CtDrvMkn.exe 872 CtDrvMkn.exe 2284 CtDrvMkn.exe 316 CtDrvMkn.exe 1872 CtDrvMkn.exe 1780 CtDrvMkn.exe 2512 CtDrvMkn.exe 1184 CtDrvMkn.exe 2196 CtDrvMkn.exe 896 CtDrvMkn.exe 2548 CtDrvMkn.exe 2560 CtDrvMkn.exe 2772 CtDrvMkn.exe 2856 CtDrvMkn.exe 2808 CtDrvMkn.exe 1740 CtDrvMkn.exe 2792 CtDrvMkn.exe 572 CtDrvMkn.exe 928 CtDrvMkn.exe 2868 CtDrvMkn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1292 wrote to memory of 2572 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 30 PID 1292 wrote to memory of 2572 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 30 PID 1292 wrote to memory of 2572 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 30 PID 1292 wrote to memory of 2572 1292 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 30 PID 2572 wrote to memory of 2832 2572 CtDrvMkn.exe 31 PID 2572 wrote to memory of 2832 2572 CtDrvMkn.exe 31 PID 2572 wrote to memory of 2832 2572 CtDrvMkn.exe 31 PID 2572 wrote to memory of 2832 2572 CtDrvMkn.exe 31 PID 2832 wrote to memory of 2796 2832 CtDrvMkn.exe 33 PID 2832 wrote to memory of 2796 2832 CtDrvMkn.exe 33 PID 2832 wrote to memory of 2796 2832 CtDrvMkn.exe 33 PID 2832 wrote to memory of 2796 2832 CtDrvMkn.exe 33 PID 2796 wrote to memory of 2624 2796 CtDrvMkn.exe 34 PID 2796 wrote to memory of 2624 2796 CtDrvMkn.exe 34 PID 2796 wrote to memory of 2624 2796 CtDrvMkn.exe 34 PID 2796 wrote to memory of 2624 2796 CtDrvMkn.exe 34 PID 2624 wrote to memory of 2632 2624 CtDrvMkn.exe 35 PID 2624 wrote to memory of 2632 2624 CtDrvMkn.exe 35 PID 2624 wrote to memory of 2632 2624 CtDrvMkn.exe 35 PID 2624 wrote to memory of 2632 2624 CtDrvMkn.exe 35 PID 2632 wrote to memory of 992 2632 CtDrvMkn.exe 36 PID 2632 wrote to memory of 992 2632 CtDrvMkn.exe 36 PID 2632 wrote to memory of 992 2632 CtDrvMkn.exe 36 PID 2632 wrote to memory of 992 2632 CtDrvMkn.exe 36 PID 992 wrote to memory of 2896 992 CtDrvMkn.exe 37 PID 992 wrote to memory of 2896 992 CtDrvMkn.exe 37 PID 992 wrote to memory of 2896 992 CtDrvMkn.exe 37 PID 992 wrote to memory of 2896 992 CtDrvMkn.exe 37 PID 2896 wrote to memory of 2044 2896 CtDrvMkn.exe 38 PID 2896 wrote to memory of 2044 2896 CtDrvMkn.exe 38 PID 2896 wrote to memory of 2044 2896 CtDrvMkn.exe 38 PID 2896 wrote to memory of 2044 2896 CtDrvMkn.exe 38 PID 2044 wrote to memory of 372 2044 CtDrvMkn.exe 39 PID 2044 wrote to memory of 372 2044 CtDrvMkn.exe 39 PID 2044 wrote to memory of 372 2044 CtDrvMkn.exe 39 PID 2044 wrote to memory of 372 2044 CtDrvMkn.exe 39 PID 372 wrote to memory of 2668 372 CtDrvMkn.exe 40 PID 372 wrote to memory of 2668 372 CtDrvMkn.exe 40 PID 372 wrote to memory of 2668 372 CtDrvMkn.exe 40 PID 372 wrote to memory of 2668 372 CtDrvMkn.exe 40 PID 2668 wrote to memory of 2304 2668 CtDrvMkn.exe 41 PID 2668 wrote to memory of 2304 2668 CtDrvMkn.exe 41 PID 2668 wrote to memory of 2304 2668 CtDrvMkn.exe 41 PID 2668 wrote to memory of 2304 2668 CtDrvMkn.exe 41 PID 2304 wrote to memory of 2192 2304 CtDrvMkn.exe 42 PID 2304 wrote to memory of 2192 2304 CtDrvMkn.exe 42 PID 2304 wrote to memory of 2192 2304 CtDrvMkn.exe 42 PID 2304 wrote to memory of 2192 2304 CtDrvMkn.exe 42 PID 2192 wrote to memory of 1092 2192 CtDrvMkn.exe 43 PID 2192 wrote to memory of 1092 2192 CtDrvMkn.exe 43 PID 2192 wrote to memory of 1092 2192 CtDrvMkn.exe 43 PID 2192 wrote to memory of 1092 2192 CtDrvMkn.exe 43 PID 1092 wrote to memory of 2328 1092 CtDrvMkn.exe 44 PID 1092 wrote to memory of 2328 1092 CtDrvMkn.exe 44 PID 1092 wrote to memory of 2328 1092 CtDrvMkn.exe 44 PID 1092 wrote to memory of 2328 1092 CtDrvMkn.exe 44 PID 2328 wrote to memory of 568 2328 CtDrvMkn.exe 45 PID 2328 wrote to memory of 568 2328 CtDrvMkn.exe 45 PID 2328 wrote to memory of 568 2328 CtDrvMkn.exe 45 PID 2328 wrote to memory of 568 2328 CtDrvMkn.exe 45 PID 568 wrote to memory of 2204 568 CtDrvMkn.exe 46 PID 568 wrote to memory of 2204 568 CtDrvMkn.exe 46 PID 568 wrote to memory of 2204 568 CtDrvMkn.exe 46 PID 568 wrote to memory of 2204 568 CtDrvMkn.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\a788f0eb33517069a146fe6558878182_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a788f0eb33517069a146fe6558878182_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1292 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Users\Admin\AppData\Local\Temp\A788F0~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:372 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2188 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2388 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2688 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1100 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:872 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe37⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1872 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1780 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1184 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2196 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2548 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2560 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2772 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2856 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe47⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1740 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe49⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:572 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe51⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5a788f0eb33517069a146fe6558878182
SHA11b9b7017a6b590950a2153fbdbad6a772428cff0
SHA25656322acab307399bc767b12dbd6dd779d2321d26565e2f34bf81753d3e561958
SHA5121864fcd065beeacaaf7e5bdf695b641cd3156e2ad909aeabb708c05ec15da2b54f37cd04682eb2b36adfa7e4934917f8c0f24bd5c932a7b856d8886925995f9e