Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2024 11:04
Behavioral task
behavioral1
Sample
a788f0eb33517069a146fe6558878182_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
a788f0eb33517069a146fe6558878182_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a788f0eb33517069a146fe6558878182_JaffaCakes118.exe
-
Size
130KB
-
MD5
a788f0eb33517069a146fe6558878182
-
SHA1
1b9b7017a6b590950a2153fbdbad6a772428cff0
-
SHA256
56322acab307399bc767b12dbd6dd779d2321d26565e2f34bf81753d3e561958
-
SHA512
1864fcd065beeacaaf7e5bdf695b641cd3156e2ad909aeabb708c05ec15da2b54f37cd04682eb2b36adfa7e4934917f8c0f24bd5c932a7b856d8886925995f9e
-
SSDEEP
3072:lDF378L22F9imS2/h1pldlDcNm4qRKWtel7GYTzujSout:lD5899hh1pfeA7RdskZSoS
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 41 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe Key value queried \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\International\Geo\Nation CtDrvMkn.exe -
Deletes itself 1 IoCs
pid Process 2184 CtDrvMkn.exe -
Executes dropped EXE 41 IoCs
pid Process 2184 CtDrvMkn.exe 1448 CtDrvMkn.exe 4856 CtDrvMkn.exe 1548 CtDrvMkn.exe 3932 CtDrvMkn.exe 2368 CtDrvMkn.exe 2404 CtDrvMkn.exe 3260 CtDrvMkn.exe 1076 CtDrvMkn.exe 1152 CtDrvMkn.exe 2968 CtDrvMkn.exe 796 CtDrvMkn.exe 4192 CtDrvMkn.exe 2392 CtDrvMkn.exe 4268 CtDrvMkn.exe 3532 CtDrvMkn.exe 3796 CtDrvMkn.exe 3320 CtDrvMkn.exe 4860 CtDrvMkn.exe 1408 CtDrvMkn.exe 1816 CtDrvMkn.exe 2144 CtDrvMkn.exe 1084 CtDrvMkn.exe 4308 CtDrvMkn.exe 4888 CtDrvMkn.exe 1300 CtDrvMkn.exe 3508 CtDrvMkn.exe 4880 CtDrvMkn.exe 4728 CtDrvMkn.exe 2584 CtDrvMkn.exe 3540 CtDrvMkn.exe 1272 CtDrvMkn.exe 2188 CtDrvMkn.exe 4200 CtDrvMkn.exe 3024 CtDrvMkn.exe 3804 CtDrvMkn.exe 3124 CtDrvMkn.exe 4144 CtDrvMkn.exe 3228 CtDrvMkn.exe 1072 CtDrvMkn.exe 2960 CtDrvMkn.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum CtDrvMkn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe a788f0eb33517069a146fe6558878182_JaffaCakes118.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File created C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe File opened for modification C:\Windows\SysWOW64\CtDrvMkn.exe CtDrvMkn.exe -
resource yara_rule behavioral2/memory/516-0-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/files/0x0008000000023cde-5.dat upx behavioral2/memory/516-35-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2184-38-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1448-40-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4856-44-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1548-46-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3932-49-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1548-50-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2368-53-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2404-56-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3260-59-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1076-62-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2968-64-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1152-66-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2968-69-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/796-72-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4192-75-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2392-78-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4268-81-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3532-83-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3796-87-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3320-90-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4860-93-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1408-96-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1816-98-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2144-101-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4308-104-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1084-106-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4308-109-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4888-112-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1300-116-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4880-118-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3508-120-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4880-123-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4728-126-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2584-129-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3540-132-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1272-135-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/2188-137-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4200-139-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3024-141-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3804-142-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3124-143-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/4144-145-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/3228-147-0x0000000000400000-0x000000000046B000-memory.dmp upx behavioral2/memory/1072-149-0x0000000000400000-0x000000000046B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 41 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CtDrvMkn.exe -
Modifies registry class 41 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a788f0eb33517069a146fe6558878182_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ CtDrvMkn.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 516 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 516 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 2184 CtDrvMkn.exe 2184 CtDrvMkn.exe 1448 CtDrvMkn.exe 1448 CtDrvMkn.exe 4856 CtDrvMkn.exe 4856 CtDrvMkn.exe 1548 CtDrvMkn.exe 1548 CtDrvMkn.exe 3932 CtDrvMkn.exe 3932 CtDrvMkn.exe 2368 CtDrvMkn.exe 2368 CtDrvMkn.exe 2404 CtDrvMkn.exe 2404 CtDrvMkn.exe 3260 CtDrvMkn.exe 3260 CtDrvMkn.exe 1076 CtDrvMkn.exe 1076 CtDrvMkn.exe 1152 CtDrvMkn.exe 1152 CtDrvMkn.exe 2968 CtDrvMkn.exe 2968 CtDrvMkn.exe 796 CtDrvMkn.exe 796 CtDrvMkn.exe 4192 CtDrvMkn.exe 4192 CtDrvMkn.exe 2392 CtDrvMkn.exe 2392 CtDrvMkn.exe 4268 CtDrvMkn.exe 4268 CtDrvMkn.exe 3532 CtDrvMkn.exe 3532 CtDrvMkn.exe 3796 CtDrvMkn.exe 3796 CtDrvMkn.exe 3320 CtDrvMkn.exe 3320 CtDrvMkn.exe 4860 CtDrvMkn.exe 4860 CtDrvMkn.exe 1408 CtDrvMkn.exe 1408 CtDrvMkn.exe 1816 CtDrvMkn.exe 1816 CtDrvMkn.exe 2144 CtDrvMkn.exe 2144 CtDrvMkn.exe 1084 CtDrvMkn.exe 1084 CtDrvMkn.exe 4308 CtDrvMkn.exe 4308 CtDrvMkn.exe 4888 CtDrvMkn.exe 4888 CtDrvMkn.exe 1300 CtDrvMkn.exe 1300 CtDrvMkn.exe 3508 CtDrvMkn.exe 3508 CtDrvMkn.exe 4880 CtDrvMkn.exe 4880 CtDrvMkn.exe 4728 CtDrvMkn.exe 4728 CtDrvMkn.exe 2584 CtDrvMkn.exe 2584 CtDrvMkn.exe 3540 CtDrvMkn.exe 3540 CtDrvMkn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 516 wrote to memory of 2184 516 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 86 PID 516 wrote to memory of 2184 516 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 86 PID 516 wrote to memory of 2184 516 a788f0eb33517069a146fe6558878182_JaffaCakes118.exe 86 PID 2184 wrote to memory of 1448 2184 CtDrvMkn.exe 90 PID 2184 wrote to memory of 1448 2184 CtDrvMkn.exe 90 PID 2184 wrote to memory of 1448 2184 CtDrvMkn.exe 90 PID 1448 wrote to memory of 4856 1448 CtDrvMkn.exe 93 PID 1448 wrote to memory of 4856 1448 CtDrvMkn.exe 93 PID 1448 wrote to memory of 4856 1448 CtDrvMkn.exe 93 PID 4856 wrote to memory of 1548 4856 CtDrvMkn.exe 94 PID 4856 wrote to memory of 1548 4856 CtDrvMkn.exe 94 PID 4856 wrote to memory of 1548 4856 CtDrvMkn.exe 94 PID 1548 wrote to memory of 3932 1548 CtDrvMkn.exe 95 PID 1548 wrote to memory of 3932 1548 CtDrvMkn.exe 95 PID 1548 wrote to memory of 3932 1548 CtDrvMkn.exe 95 PID 3932 wrote to memory of 2368 3932 CtDrvMkn.exe 96 PID 3932 wrote to memory of 2368 3932 CtDrvMkn.exe 96 PID 3932 wrote to memory of 2368 3932 CtDrvMkn.exe 96 PID 2368 wrote to memory of 2404 2368 CtDrvMkn.exe 97 PID 2368 wrote to memory of 2404 2368 CtDrvMkn.exe 97 PID 2368 wrote to memory of 2404 2368 CtDrvMkn.exe 97 PID 2404 wrote to memory of 3260 2404 CtDrvMkn.exe 98 PID 2404 wrote to memory of 3260 2404 CtDrvMkn.exe 98 PID 2404 wrote to memory of 3260 2404 CtDrvMkn.exe 98 PID 3260 wrote to memory of 1076 3260 CtDrvMkn.exe 100 PID 3260 wrote to memory of 1076 3260 CtDrvMkn.exe 100 PID 3260 wrote to memory of 1076 3260 CtDrvMkn.exe 100 PID 1076 wrote to memory of 1152 1076 CtDrvMkn.exe 102 PID 1076 wrote to memory of 1152 1076 CtDrvMkn.exe 102 PID 1076 wrote to memory of 1152 1076 CtDrvMkn.exe 102 PID 1152 wrote to memory of 2968 1152 CtDrvMkn.exe 103 PID 1152 wrote to memory of 2968 1152 CtDrvMkn.exe 103 PID 1152 wrote to memory of 2968 1152 CtDrvMkn.exe 103 PID 2968 wrote to memory of 796 2968 CtDrvMkn.exe 104 PID 2968 wrote to memory of 796 2968 CtDrvMkn.exe 104 PID 2968 wrote to memory of 796 2968 CtDrvMkn.exe 104 PID 796 wrote to memory of 4192 796 CtDrvMkn.exe 105 PID 796 wrote to memory of 4192 796 CtDrvMkn.exe 105 PID 796 wrote to memory of 4192 796 CtDrvMkn.exe 105 PID 4192 wrote to memory of 2392 4192 CtDrvMkn.exe 106 PID 4192 wrote to memory of 2392 4192 CtDrvMkn.exe 106 PID 4192 wrote to memory of 2392 4192 CtDrvMkn.exe 106 PID 2392 wrote to memory of 4268 2392 CtDrvMkn.exe 107 PID 2392 wrote to memory of 4268 2392 CtDrvMkn.exe 107 PID 2392 wrote to memory of 4268 2392 CtDrvMkn.exe 107 PID 4268 wrote to memory of 3532 4268 CtDrvMkn.exe 108 PID 4268 wrote to memory of 3532 4268 CtDrvMkn.exe 108 PID 4268 wrote to memory of 3532 4268 CtDrvMkn.exe 108 PID 3532 wrote to memory of 3796 3532 CtDrvMkn.exe 109 PID 3532 wrote to memory of 3796 3532 CtDrvMkn.exe 109 PID 3532 wrote to memory of 3796 3532 CtDrvMkn.exe 109 PID 3796 wrote to memory of 3320 3796 CtDrvMkn.exe 110 PID 3796 wrote to memory of 3320 3796 CtDrvMkn.exe 110 PID 3796 wrote to memory of 3320 3796 CtDrvMkn.exe 110 PID 3320 wrote to memory of 4860 3320 CtDrvMkn.exe 111 PID 3320 wrote to memory of 4860 3320 CtDrvMkn.exe 111 PID 3320 wrote to memory of 4860 3320 CtDrvMkn.exe 111 PID 4860 wrote to memory of 1408 4860 CtDrvMkn.exe 112 PID 4860 wrote to memory of 1408 4860 CtDrvMkn.exe 112 PID 4860 wrote to memory of 1408 4860 CtDrvMkn.exe 112 PID 1408 wrote to memory of 1816 1408 CtDrvMkn.exe 113 PID 1408 wrote to memory of 1816 1408 CtDrvMkn.exe 113 PID 1408 wrote to memory of 1816 1408 CtDrvMkn.exe 113 PID 1816 wrote to memory of 2144 1816 CtDrvMkn.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\a788f0eb33517069a146fe6558878182_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a788f0eb33517069a146fe6558878182_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Users\Admin\AppData\Local\Temp\A788F0~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3932 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1076 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:796 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4308 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4888 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3508 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4880 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4728 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3540 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2188 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4200 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3024 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3804 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3124 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3228 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1072 -
C:\Windows\SysWOW64\CtDrvMkn.exe"C:\Windows\system32\CtDrvMkn.exe" C:\Windows\SysWOW64\CtDrvMkn.exe42⤵
- Executes dropped EXE
PID:2960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5a788f0eb33517069a146fe6558878182
SHA11b9b7017a6b590950a2153fbdbad6a772428cff0
SHA25656322acab307399bc767b12dbd6dd779d2321d26565e2f34bf81753d3e561958
SHA5121864fcd065beeacaaf7e5bdf695b641cd3156e2ad909aeabb708c05ec15da2b54f37cd04682eb2b36adfa7e4934917f8c0f24bd5c932a7b856d8886925995f9e