Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/12/2024, 08:30
Static task
static1
Behavioral task
behavioral1
Sample
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe
-
Size
232KB
-
MD5
dde1778d160b2a2822bc89f141f55b92
-
SHA1
0517b846063dfbc8c1cc06da9b2818579b4d22ee
-
SHA256
c72f4b0ec5e830f823d8803584c61b2b66492586746ef72f545ab2f9bdc42b0a
-
SHA512
4776febb78402485429b30f09fbe76bc9f217267c4d6e2beb853fa0b95b9ee569d6bf5cbc9cc65acb5b5f9caa4e1dc4a76da2f63027fec11f96a475f81b1831b
-
SSDEEP
6144:knyKw55nK7CcbCHGLFhdlAXk3stFSuH0+SlQh:w6R0EIhdlV3stFDYCh
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\system\DisableRegistryTools = "1" dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Disables Task Manager via registry modification
-
Modifies Windows Firewall 2 TTPs 1 IoCs
pid Process 1020 netsh.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\K: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\J: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\Z: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\R: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\P: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\O: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\H: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\E: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\Y: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\W: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\T: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\S: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\L: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\V: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\U: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\Q: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\M: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\X: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\I: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened (read-only) \??\G: dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 3 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification F:\autorun.inf dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened for modification C:\autorun.inf dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
resource yara_rule behavioral2/memory/3608-3-0x0000000002320000-0x0000000003350000-memory.dmp upx behavioral2/memory/3608-1-0x0000000002320000-0x0000000003350000-memory.dmp upx behavioral2/memory/3608-11-0x0000000002320000-0x0000000003350000-memory.dmp upx behavioral2/memory/3608-5-0x0000000002320000-0x0000000003350000-memory.dmp upx -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\PROGRAM FILES (X86)\ADOBE\ACROBAT READER DC\READER\ACRORD32.EXE dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Event Triggered Execution: Netsh Helper DLL 1 TTPs 3 IoCs
Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key queried \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe Key value enumerated \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\NetSh netsh.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString winword.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily winword.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU winword.exe -
Suspicious behavior: AddClipboardFormatListener 2 IoCs
pid Process 3148 winword.exe 3148 winword.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe Token: SeDebugPrivilege 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 3148 winword.exe 3148 winword.exe 3148 winword.exe 3148 winword.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 3608 wrote to memory of 768 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 8 PID 3608 wrote to memory of 776 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 9 PID 3608 wrote to memory of 64 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 13 PID 3608 wrote to memory of 2636 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 44 PID 3608 wrote to memory of 2648 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 45 PID 3608 wrote to memory of 2828 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 51 PID 3608 wrote to memory of 3432 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 56 PID 3608 wrote to memory of 3560 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 57 PID 3608 wrote to memory of 3744 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 58 PID 3608 wrote to memory of 3860 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 59 PID 3608 wrote to memory of 3928 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 60 PID 3608 wrote to memory of 4008 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 61 PID 3608 wrote to memory of 4108 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 62 PID 3608 wrote to memory of 4348 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 64 PID 3608 wrote to memory of 4416 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 76 PID 3608 wrote to memory of 1020 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 82 PID 3608 wrote to memory of 1020 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 82 PID 3608 wrote to memory of 1020 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 82 PID 3608 wrote to memory of 3148 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 83 PID 3608 wrote to memory of 3148 3608 dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe 83 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:768
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:776
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:64
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2636
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2648
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2828
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3432
-
C:\Users\Admin\AppData\Local\Temp\dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dde1778d160b2a2822bc89f141f55b92_JaffaCakes118.exe"2⤵
- Modifies visibility of file extensions in Explorer
- UAC bypass
- Disables RegEdit via registry modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:3608 -
C:\Windows\SysWOW64\netsh.exenetsh firewall set opmode disable3⤵
- Modifies Windows Firewall
- Event Triggered Execution: Netsh Helper DLL
- System Location Discovery: System Language Discovery
PID:1020
-
-
C:\Program Files\Microsoft Office\Root\Office16\winword.exe"C:\Program Files\Microsoft Office\Root\Office16\winword.exe"3⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: AddClipboardFormatListener
- Suspicious use of SetWindowsHookEx
PID:3148
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3560
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3744
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3860
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3928
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4008
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4108
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4348
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4416
Network
MITRE ATT&CK Enterprise v15
Persistence
Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Netsh Helper DLL
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
1Hidden Files and Directories
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
263KB
MD5ff0e07eff1333cdf9fc2523d323dd654
SHA177a1ae0dd8dbc3fee65dd6266f31e2a564d088a4
SHA2563f925e0cc1542f09de1f99060899eafb0042bb9682507c907173c392115a44b5
SHA512b4615f995fab87661c2dbe46625aa982215d7bde27cafae221dca76087fe76da4b4a381943436fcac1577cb3d260d0050b32b7b93e3eb07912494429f126bb3d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\fb3b0dbfee58fac8.customDestinations-ms
Filesize2KB
MD5bb1f9d833613dcc79cced8cafc88a125
SHA14f4fcb1261ea3d27b3e412a7f8ef41a26161f9a6
SHA2560bc0805c0111619990df3a2a0b668b7db0da75f90b111b2a00b89109750c3180
SHA512f2f9d1995ef24c5cbfa3717b69f0755480f2d2ddc0096d482c2bbd3fc14fe30e4956d0acaf04877c8e66ead979b93cd07f7264ddcf03ea76f4894633f969dbdb
-
Filesize
126B
MD5163e20cbccefcdd42f46e43a94173c46
SHA14c7b5048e8608e2a75799e00ecf1bbb4773279ae
SHA2567780bee9df142a17e0457f3dcb2788b50fc2792370089335597d33719126fb7e
SHA512e5ac0ff6b087857799ab70f68067c9dc73eeb93ccfcad87047052380b95ade3e6eb2a7d01a0f850d548a39f4b1ebb60e299d603dbe25c31b9a3585b34a0c65a8
-
Filesize
165KB
MD5dde74270cccc960d547eb17ff2543022
SHA16bd4160a2208728a0e02bb5a00fa4211a6314c89
SHA25663619a07c9ee6bfee7554018a36693e657c2dea027677e53b5373c6a23733ddc
SHA512a04e0805017d6dc7b624266ac7e5902fd0e33faa63aa61c4f9deb5459976de0a010c815ea87f1739fa38ba11786e790d97d0453869ded59b9b2c7c586c59c87d
-
Filesize
165KB
MD508a80b363a9d88829836b08e7284dc40
SHA1fcfb6360dd316d8bb52e348797288890580b0a8d
SHA2566faa1a370f8462ab6f3a899f3cd753cf8354368f50a09515a16d4d63cd32fa8a
SHA5129226dabb455d9e0f7d5920d2223230a5789ae0305661d05e78c82da4b63c97803a071e63d0ae5d107150cb79f68337972b1b15b28c82863aa300828826cf2958