Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
12-12-2024 21:00
Static task
static1
Behavioral task
behavioral1
Sample
e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe
-
Size
110KB
-
MD5
e8410244689e36647b27b892a55f66ef
-
SHA1
4d5cc05d075eb9d6744956c610a3d311c9fb7dee
-
SHA256
0a0d2843578d60cf49e4a4976f893875cf601ab95254b680a518f74278c0f2b9
-
SHA512
668a1500829888b11c054893e8ae715254cca04a0133929690a7d986280591b31f5030783f53e8bc03ec9c0f568685d13877d6db3ed1d5fe1c887f5ac4edd4fe
-
SSDEEP
3072:EeQl+BkEjTJ0c4+S2Ra3KS2pNyZHo5p6a:5Ql+KeTJzs2Ra3h8p6a
Malware Config
Extracted
metasploit
encoder/fnstenv_mov
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Modifies security service 2 TTPs 22 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wuauserv\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" regedit.exe -
Executes dropped EXE 10 IoCs
pid Process 2680 wintcp32.exe 2104 wintcp32.exe 2904 wintcp32.exe 1104 wintcp32.exe 2612 wintcp32.exe 1680 wintcp32.exe 316 wintcp32.exe 2792 wintcp32.exe 2180 wintcp32.exe 2964 wintcp32.exe -
Loads dropped DLL 20 IoCs
pid Process 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 2680 wintcp32.exe 2680 wintcp32.exe 2104 wintcp32.exe 2104 wintcp32.exe 2904 wintcp32.exe 2904 wintcp32.exe 1104 wintcp32.exe 1104 wintcp32.exe 2612 wintcp32.exe 2612 wintcp32.exe 1680 wintcp32.exe 1680 wintcp32.exe 316 wintcp32.exe 316 wintcp32.exe 2792 wintcp32.exe 2792 wintcp32.exe 2180 wintcp32.exe 2180 wintcp32.exe -
Drops file in System32 directory 22 IoCs
description ioc Process File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File created C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe File opened for modification C:\Windows\SysWOW64\wintcp32.exe wintcp32.exe -
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wintcp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regedit.exe -
Runs .reg file with regedit 11 IoCs
pid Process 572 regedit.exe 2996 regedit.exe 2420 regedit.exe 2732 regedit.exe 1540 regedit.exe 1152 regedit.exe 1636 regedit.exe 3056 regedit.exe 2816 regedit.exe 876 regedit.exe 2364 regedit.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1708 wrote to memory of 3028 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 31 PID 1708 wrote to memory of 3028 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 31 PID 1708 wrote to memory of 3028 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 31 PID 1708 wrote to memory of 3028 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 31 PID 1708 wrote to memory of 2680 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 32 PID 1708 wrote to memory of 2680 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 32 PID 1708 wrote to memory of 2680 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 32 PID 1708 wrote to memory of 2680 1708 e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe 32 PID 3028 wrote to memory of 2364 3028 cmd.exe 33 PID 3028 wrote to memory of 2364 3028 cmd.exe 33 PID 3028 wrote to memory of 2364 3028 cmd.exe 33 PID 3028 wrote to memory of 2364 3028 cmd.exe 33 PID 2680 wrote to memory of 1660 2680 wintcp32.exe 34 PID 2680 wrote to memory of 1660 2680 wintcp32.exe 34 PID 2680 wrote to memory of 1660 2680 wintcp32.exe 34 PID 2680 wrote to memory of 1660 2680 wintcp32.exe 34 PID 1660 wrote to memory of 1636 1660 cmd.exe 35 PID 1660 wrote to memory of 1636 1660 cmd.exe 35 PID 1660 wrote to memory of 1636 1660 cmd.exe 35 PID 1660 wrote to memory of 1636 1660 cmd.exe 35 PID 2680 wrote to memory of 2104 2680 wintcp32.exe 36 PID 2680 wrote to memory of 2104 2680 wintcp32.exe 36 PID 2680 wrote to memory of 2104 2680 wintcp32.exe 36 PID 2680 wrote to memory of 2104 2680 wintcp32.exe 36 PID 2104 wrote to memory of 612 2104 wintcp32.exe 37 PID 2104 wrote to memory of 612 2104 wintcp32.exe 37 PID 2104 wrote to memory of 612 2104 wintcp32.exe 37 PID 2104 wrote to memory of 612 2104 wintcp32.exe 37 PID 612 wrote to memory of 3056 612 cmd.exe 38 PID 612 wrote to memory of 3056 612 cmd.exe 38 PID 612 wrote to memory of 3056 612 cmd.exe 38 PID 612 wrote to memory of 3056 612 cmd.exe 38 PID 2104 wrote to memory of 2904 2104 wintcp32.exe 39 PID 2104 wrote to memory of 2904 2104 wintcp32.exe 39 PID 2104 wrote to memory of 2904 2104 wintcp32.exe 39 PID 2104 wrote to memory of 2904 2104 wintcp32.exe 39 PID 2904 wrote to memory of 2652 2904 wintcp32.exe 40 PID 2904 wrote to memory of 2652 2904 wintcp32.exe 40 PID 2904 wrote to memory of 2652 2904 wintcp32.exe 40 PID 2904 wrote to memory of 2652 2904 wintcp32.exe 40 PID 2652 wrote to memory of 1152 2652 cmd.exe 41 PID 2652 wrote to memory of 1152 2652 cmd.exe 41 PID 2652 wrote to memory of 1152 2652 cmd.exe 41 PID 2652 wrote to memory of 1152 2652 cmd.exe 41 PID 2904 wrote to memory of 1104 2904 wintcp32.exe 42 PID 2904 wrote to memory of 1104 2904 wintcp32.exe 42 PID 2904 wrote to memory of 1104 2904 wintcp32.exe 42 PID 2904 wrote to memory of 1104 2904 wintcp32.exe 42 PID 1104 wrote to memory of 2396 1104 wintcp32.exe 43 PID 1104 wrote to memory of 2396 1104 wintcp32.exe 43 PID 1104 wrote to memory of 2396 1104 wintcp32.exe 43 PID 1104 wrote to memory of 2396 1104 wintcp32.exe 43 PID 2396 wrote to memory of 572 2396 cmd.exe 44 PID 2396 wrote to memory of 572 2396 cmd.exe 44 PID 2396 wrote to memory of 572 2396 cmd.exe 44 PID 2396 wrote to memory of 572 2396 cmd.exe 44 PID 1104 wrote to memory of 2612 1104 wintcp32.exe 45 PID 1104 wrote to memory of 2612 1104 wintcp32.exe 45 PID 1104 wrote to memory of 2612 1104 wintcp32.exe 45 PID 1104 wrote to memory of 2612 1104 wintcp32.exe 45 PID 2612 wrote to memory of 2968 2612 wintcp32.exe 46 PID 2612 wrote to memory of 2968 2612 wintcp32.exe 46 PID 2612 wrote to memory of 2968 2612 wintcp32.exe 46 PID 2612 wrote to memory of 2968 2612 wintcp32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg3⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2364
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 496 "C:\Users\Admin\AppData\Local\Temp\e8410244689e36647b27b892a55f66ef_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg4⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1636
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 536 "C:\Windows\SysWOW64\wintcp32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:612 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg5⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:3056
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 540 "C:\Windows\SysWOW64\wintcp32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg6⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1152
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 544 "C:\Windows\SysWOW64\wintcp32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg7⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:572
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 548 "C:\Windows\SysWOW64\wintcp32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat7⤵
- System Location Discovery: System Language Discovery
PID:2968 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg8⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2996
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 552 "C:\Windows\SysWOW64\wintcp32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1680 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat8⤵
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg9⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2420
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 556 "C:\Windows\SysWOW64\wintcp32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat9⤵
- System Location Discovery: System Language Discovery
PID:380 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg10⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2816
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 560 "C:\Windows\SysWOW64\wintcp32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2792 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat10⤵
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg11⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:2732
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 564 "C:\Windows\SysWOW64\wintcp32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat11⤵
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg12⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:876
-
-
-
C:\Windows\SysWOW64\wintcp32.exeC:\Windows\system32\wintcp32.exe 528 "C:\Windows\SysWOW64\wintcp32.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c c:\a.bat12⤵
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Windows\SysWOW64\regedit.exeREGEDIT /S C:\Users\Admin\AppData\Local\Temp\1.reg13⤵
- Modifies security service
- System Location Discovery: System Language Discovery
- Runs .reg file with regedit
PID:1540
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5908860a865f8ed2e14085e35256578dd
SHA17ff5ee35cc7e96a661848eb95a70d0b8d2d78603
SHA256d2b73d92cf00a9dc61f2777a7f298e8c4bb72697236965f8931bdfc9d0924c5f
SHA512a93bb8cb180d957ef2b2c511d5ff66a25d2bcfb071af9884c146b8c422d1fadc9a4d390712bc2cb27640634854b3e59d5209803373cf1f42381d513747a65fd9
-
Filesize
2KB
MD5501effddf60a974e98b67dc8921aa7e8
SHA1734dfe4b508dbc1527ec92e91821a1251aec5b2e
SHA256672e3c47827c2fc929fc92cd7d2a61d9ba41e847f876a1e5486e2701cbc3cb06
SHA51228081046c5b0eb6a5578134e19af2a447d38afda338bd3ae4c2fc0054460580d47f9ab6d8c9001ff605e76df462e7bbcab80be15deaf3ca6264e20717dfb9c1c
-
Filesize
3KB
MD55e073629d751540b3512a229a7c56baf
SHA18d384f06bf3fe00d178514990ae39fc54d4e3941
SHA2562039732d26af5a0d4db7bda4a781967a0e0e4543dea9838690219e3cb688449e
SHA51284fc0d818ecd5706904b5918170436820ffc78c894cbe549a4f5b04b5c9832e3d709c98d56c8522b55a98cd9db8ec04aeaa020e9162e8a35503597ca580126fd
-
Filesize
1KB
MD53bd23392c6fcc866c4561388c1dc72ac
SHA1c4b1462473f1d97fed434014532ea344b8fc05c1
SHA256696a382790ee24d6256b3618b1431eaf14c510a12ff2585edfeae430024c7a43
SHA51215b3a33bb5d5d6e6b149773ff47ade4f22271264f058ad8439403df71d6ecfaa2729ef48487f43d68b517b15efed587b368bc6c5df549983de410ec23b55adb1
-
Filesize
206B
MD52d9f1ff716273d19e3f0d10a3cd8736f
SHA1b4ca02834dd3f3489c5088d2157279d2be90f5ff
SHA2569acf0b6f653d189bcf02fa9941a2a1a6b6f60c6fa1f62ad38f314014ec188623
SHA5121d08e079d12a58115ced67c002d383a4ff5aca81fde9ac81bb14d8c5dcdfe07839c7b895130b746d4691cd38dc74fbfc0bdc8605b520ac85bc137fd5fa922025
-
Filesize
849B
MD5558ce6da965ba1758d112b22e15aa5a2
SHA1a365542609e4d1dc46be62928b08612fcabe2ede
SHA256c11beaac10a5e00391ef4b41be8c240f59c5a2dc930aead6d7db237fcd2641fb
SHA51237f7f10c3d201b11cc5224ae69c5990eb33b4430c601d3c21f6bec9323621120442e0cfa49e1f4eda459ea4ac750277e446dca78b9e44c1445bd891e4e460b5c
-
Filesize
3KB
MD59e5db93bd3302c217b15561d8f1e299d
SHA195a5579b336d16213909beda75589fd0a2091f30
SHA256f360fb5740172b6b4dd59c1ac30b480511665ae991196f833167e275d91f943e
SHA512b5547e5047a3c43397ee846ff9d5979cba45ba44671db5c5df5536d9dc26262e27a8645a08e0cf35960a3601dc0f6f5fe8d47ae232c9ca44d6899e97d36fb25a
-
Filesize
384B
MD5c93c561465db53bf9a99759de9d25f07
SHA15386934828e2c2589bfe394ac1f03ffbfba93bfa
SHA25632eae568e5a03070b122719c66798a0574658b85dc61bcf3c48eae29f4d77851
SHA512bb0163e1a26f6b7cfd4ce214ae33a56e446fa74efca7682352ab52aa4b4d5b5b92a141e3e2a12b76f33827b1cd423f3d862cc973079d5da291832ce6a9fb9b18
-
Filesize
5KB
MD50019a0451cc6b9659762c3e274bc04fb
SHA15259e256cc0908f2846e532161b989f1295f479b
SHA256ce4674afd978d1401596d22a0961f90c8fb53c5bd55649684e1a999c8cf77876
SHA512314c23ec37cb0cd4443213c019c4541df968447353b422ef6fff1e7ddf6c983c80778787408b7ca9b81e580a6a7f1589ca7f43c022e6fc16182973580ed4d904
-
Filesize
110KB
MD5e8410244689e36647b27b892a55f66ef
SHA14d5cc05d075eb9d6744956c610a3d311c9fb7dee
SHA2560a0d2843578d60cf49e4a4976f893875cf601ab95254b680a518f74278c0f2b9
SHA512668a1500829888b11c054893e8ae715254cca04a0133929690a7d986280591b31f5030783f53e8bc03ec9c0f568685d13877d6db3ed1d5fe1c887f5ac4edd4fe