Analysis
-
max time kernel
21s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe
Resource
win7-20240729-en
General
-
Target
eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe
-
Size
376KB
-
MD5
eb34748365c13012b9ac9cc72f7239a9
-
SHA1
2b3950148a078a0973493f149eaaf43cc99dba52
-
SHA256
eb521d50384f45b31ad8fd002b48429febdee7c02866ab752631f27b42b0721e
-
SHA512
bffe9c7dc112645f9ab698ebd67364614b5f2206bb7092ab657e2966c784fefbc680d9e62f9a61b6480005e954694645da3f2ddf66c44c3630a8b41f6b85309e
-
SSDEEP
3072:AmKxZkvuz8WClBs3zTiFGns5X7z4hJgKVES3Esv:A9kDlyjTiysJEJTCS
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" Qyyy jnsateb.exe -
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" Qyyy jnsateb.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" Qyyy jnsateb.exe -
Sality family
-
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Qyyy jnsateb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Qyyy jnsateb.exe -
Deletes itself 1 IoCs
pid Process 2864 Qyyy jnsateb.exe -
Executes dropped EXE 1 IoCs
pid Process 2864 Qyyy jnsateb.exe -
Modifies system executable filetype association 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "\u00a0File Folder" Qyyy jnsateb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt Qyyy jnsateb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\InfoTip = "prop:" Qyyy jnsateb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\TileInfo = "prop:" Qyyy jnsateb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UacDisableNotify = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" Qyyy jnsateb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusOverride = "1" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\FirewallOverride = "1" Qyyy jnsateb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\Svc Qyyy jnsateb.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ Qyyy jnsateb.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\5728405381-.exe" Qyyy jnsateb.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Qyyy jnsateb.exe -
Enumerates connected drives 3 TTPs 1 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: Qyyy jnsateb.exe -
resource yara_rule behavioral1/memory/2604-3-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-7-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-14-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-16-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-19-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-17-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-15-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-18-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-6-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2604-41-0x0000000002540000-0x00000000035CE000-memory.dmp upx behavioral1/memory/2864-211-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-213-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-214-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-215-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-229-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-230-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-228-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-240-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-221-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-247-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-246-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-248-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-249-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-250-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx behavioral1/memory/2864-267-0x0000000003D30000-0x0000000004DBE000-memory.dmp upx -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\5728405381-.exe Qyyy jnsateb.exe File opened for modification C:\Windows\5728405381-.exe Qyyy jnsateb.exe File opened for modification C:\Windows\SYSTEM.INI eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe File created C:\Windows\Qyyy jnsateb.exe eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe File opened for modification C:\Windows\Qyyy jnsateb.exe eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe File opened for modification C:\Windows\Qyyy jnsateb.exe Qyyy jnsateb.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Qyyy jnsateb.exe -
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\InfoTip = "prop:" Qyyy jnsateb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\TileInfo = "prop:" Qyyy jnsateb.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\exefile Qyyy jnsateb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\ = "\u00a0File Folder" Qyyy jnsateb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\NeverShowExt Qyyy jnsateb.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 2864 Qyyy jnsateb.exe -
Suspicious use of AdjustPrivilegeToken 45 IoCs
description pid Process Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe Token: SeDebugPrivilege 2864 Qyyy jnsateb.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 2864 Qyyy jnsateb.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1116 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 19 PID 2604 wrote to memory of 1164 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 20 PID 2604 wrote to memory of 1204 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 21 PID 2604 wrote to memory of 324 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 25 PID 2604 wrote to memory of 2864 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 31 PID 2604 wrote to memory of 2864 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 31 PID 2604 wrote to memory of 2864 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 31 PID 2604 wrote to memory of 2864 2604 eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe 31 PID 2864 wrote to memory of 1116 2864 Qyyy jnsateb.exe 19 PID 2864 wrote to memory of 1164 2864 Qyyy jnsateb.exe 20 PID 2864 wrote to memory of 1204 2864 Qyyy jnsateb.exe 21 PID 2864 wrote to memory of 324 2864 Qyyy jnsateb.exe 25 -
System policy modification 1 TTPs 2 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" Qyyy jnsateb.exe
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1116
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1164
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\eb34748365c13012b9ac9cc72f7239a9_JaffaCakes118.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2604 -
C:\Windows\Qyyy jnsateb.exe"C:\Windows\Qyyy jnsateb.exe"3⤵
- Modifies firewall policy service
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- UAC bypass
- Windows security bypass
- Deletes itself
- Executes dropped EXE
- Modifies system executable filetype association
- Windows security modification
- Adds Run key to start application
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2864
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:324
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Event Triggered Execution
1Change Default File Association
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Hide Artifacts
2Hidden Files and Directories
2Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
9Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
257B
MD51a2f09b523c7d9b11d6db043d0efc6aa
SHA1ee1898bb2be8b305ff8ff7ef48b46ae0947674b1
SHA256463e825b4fc0de74839722dbb5fc6b18db4918c9da51e6a0369e67030412331a
SHA512bd5655c9e6d783d99c2c9b623b151bd9bcf9a79160410038e8f0dd36b00491123f5319020442c184cd9ef0f9f0a2ad2d5fcbbe4bf598f2ecaba5b8996accaaa7
-
Filesize
100KB
MD5e87816bceccb50ffd9586123516c56ae
SHA1513b05bbe95dad41aee89e6ece5f73131c8b6dd6
SHA256102d18865ede4ab759c8b1f1d72cd63c3ce278a91b827b765c23eeae98c8bb9a
SHA5124056a1007e8aa125fe699ae3984dbbeee37e9810261e2b432c9155049a2fd211e55ca9bcc0167d986ce719153f90b7ed30139b068c759066a2e34e952cbc422c
-
Filesize
376KB
MD5eb34748365c13012b9ac9cc72f7239a9
SHA12b3950148a078a0973493f149eaaf43cc99dba52
SHA256eb521d50384f45b31ad8fd002b48429febdee7c02866ab752631f27b42b0721e
SHA512bffe9c7dc112645f9ab698ebd67364614b5f2206bb7092ab657e2966c784fefbc680d9e62f9a61b6480005e954694645da3f2ddf66c44c3630a8b41f6b85309e