Analysis
-
max time kernel
148s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-11-2024 02:20
Static task
static1
Behavioral task
behavioral1
Sample
b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe
-
Size
107KB
-
MD5
b46729074b73bc84457b30bebda8f537
-
SHA1
c65c078428bb3e2da04bc9b7da72f179a3e0e94d
-
SHA256
de0186a8e6eba22419458f5f174ff1d58ebd999d2e00353027b53d68db233fe9
-
SHA512
14c634caabf5c4b879c21252acc272f3285812ea95ae21599176cca6de3ea894646b65f39d403795e7139cd501661e2cc7351c615076343d3562207de5a22d64
-
SSDEEP
1536:vSRKvgtx1lr6an/Tz2vm2FuQUy58XuSbCV6jmy5XXuSbCV6jXow:vSRKI732z58DDd5XDDXow
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 46 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV}\StubPath = "C:\\Windows\\winxp\\dll.exe restart" dll.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{DHEFVG71-W57E-P084-46QO-3W0QYYCGM2XV} dll.exe -
Executes dropped EXE 22 IoCs
pid Process 3020 dll.exe 2636 dll.exe 2628 dll.exe 2208 dll.exe 1852 dll.exe 1872 dll.exe 1876 dll.exe 1692 dll.exe 2180 dll.exe 2796 dll.exe 2672 dll.exe 2280 dll.exe 2344 dll.exe 2996 dll.exe 2340 dll.exe 1644 dll.exe 2492 dll.exe 2260 dll.exe 2836 dll.exe 2196 dll.exe 2924 dll.exe 1844 dll.exe -
Loads dropped DLL 23 IoCs
pid Process 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe 696 svchost.exe -
Adds Run key to start application 2 TTPs 46 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\winxp\\dll.exe" dll.exe Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\winxp\\dll.exe" dll.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\winxp\dll.exe b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe File opened for modification C:\Windows\winxp\dll.exe b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 24 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dll.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 696 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 30 PID 2112 wrote to memory of 696 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 30 PID 2112 wrote to memory of 696 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 30 PID 2112 wrote to memory of 696 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 30 PID 2112 wrote to memory of 696 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2312 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2312 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2312 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2312 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2312 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 32 PID 2112 wrote to memory of 2132 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 33 PID 2112 wrote to memory of 2132 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 33 PID 2112 wrote to memory of 2132 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 33 PID 2112 wrote to memory of 2132 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 33 PID 2112 wrote to memory of 2132 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 33 PID 2112 wrote to memory of 388 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 34 PID 2112 wrote to memory of 388 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 34 PID 2112 wrote to memory of 388 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 34 PID 2112 wrote to memory of 388 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 34 PID 2112 wrote to memory of 388 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 34 PID 2112 wrote to memory of 1424 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 35 PID 2112 wrote to memory of 1424 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 35 PID 2112 wrote to memory of 1424 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 35 PID 2112 wrote to memory of 1424 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 35 PID 2112 wrote to memory of 1424 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 35 PID 2112 wrote to memory of 2016 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 36 PID 2112 wrote to memory of 2016 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 36 PID 2112 wrote to memory of 2016 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 36 PID 2112 wrote to memory of 2016 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 36 PID 2112 wrote to memory of 2016 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 36 PID 2112 wrote to memory of 2756 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 37 PID 2112 wrote to memory of 2756 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 37 PID 2112 wrote to memory of 2756 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 37 PID 2112 wrote to memory of 2756 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 37 PID 2112 wrote to memory of 2756 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 37 PID 2112 wrote to memory of 2764 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 38 PID 2112 wrote to memory of 2764 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 38 PID 2112 wrote to memory of 2764 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 38 PID 2112 wrote to memory of 2764 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 38 PID 2112 wrote to memory of 2764 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 38 PID 2112 wrote to memory of 2852 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 39 PID 2112 wrote to memory of 2852 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 39 PID 2112 wrote to memory of 2852 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 39 PID 2112 wrote to memory of 2852 2112 b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe 39 PID 696 wrote to memory of 3020 696 svchost.exe 40 PID 696 wrote to memory of 3020 696 svchost.exe 40 PID 696 wrote to memory of 3020 696 svchost.exe 40 PID 696 wrote to memory of 3020 696 svchost.exe 40 PID 3020 wrote to memory of 2020 3020 dll.exe 41 PID 3020 wrote to memory of 2020 3020 dll.exe 41 PID 3020 wrote to memory of 2020 3020 dll.exe 41 PID 3020 wrote to memory of 2020 3020 dll.exe 41 PID 3020 wrote to memory of 2020 3020 dll.exe 41 PID 3020 wrote to memory of 2900 3020 dll.exe 42 PID 3020 wrote to memory of 2900 3020 dll.exe 42 PID 3020 wrote to memory of 2900 3020 dll.exe 42 PID 3020 wrote to memory of 2900 3020 dll.exe 42 PID 3020 wrote to memory of 2900 3020 dll.exe 42 PID 3020 wrote to memory of 2648 3020 dll.exe 43 PID 3020 wrote to memory of 2648 3020 dll.exe 43 PID 3020 wrote to memory of 2648 3020 dll.exe 43 PID 3020 wrote to memory of 2648 3020 dll.exe 43 PID 3020 wrote to memory of 2648 3020 dll.exe 43 PID 3020 wrote to memory of 2988 3020 dll.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\b46729074b73bc84457b30bebda8f537_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:696 -
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2648
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2832
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2728
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2608
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2628 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:584
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1456
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1880
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1476
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2516
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1852 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2136
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:628
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1452
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1496
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2904
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1184
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2792
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:800
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1876 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1952
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1692 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2240
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2292
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2448
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2276
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:984
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:920
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:448
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3036
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1936
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1152
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1792
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:324
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1892
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2280 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2248
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:236
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2552
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2224
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1420
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1652
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2096
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:3068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2384
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2340 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2468
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2876
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2884
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2204
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2720
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2620
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2812
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2668
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2644
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2052
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2260 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:876
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1100
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:672
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:400
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1612
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1076
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2984
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1836
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1876
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2272
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2128
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1120
-
-
-
C:\Windows\winxp\dll.exe"C:\Windows\winxp\dll.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1844
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2312
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1424
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2016
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2852
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53a1a4dd734489b83768ce7c53a4a8309
SHA1f65c2c248e5d0fbd32aa8f0abcc449656947c37c
SHA256728eb7888142b33d4ef5d580a8bfc0ce209dbeba9fac9c27ad96edbc24956978
SHA512fd972afe63b7457666341e7ddd9db3b25a7c594294c36bdd06c141e695b1c2e8290041194175f33a60b3922357bd09a60571aa9b888038b09c924a05fd8167ed
-
Filesize
107KB
MD5b46729074b73bc84457b30bebda8f537
SHA1c65c078428bb3e2da04bc9b7da72f179a3e0e94d
SHA256de0186a8e6eba22419458f5f174ff1d58ebd999d2e00353027b53d68db233fe9
SHA51214c634caabf5c4b879c21252acc272f3285812ea95ae21599176cca6de3ea894646b65f39d403795e7139cd501661e2cc7351c615076343d3562207de5a22d64