Analysis
-
max time kernel
149s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
18-12-2024 23:26
Static task
static1
Behavioral task
behavioral1
Sample
fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe
-
Size
206KB
-
MD5
fd87dbb5ac4f2e34d6d92ee71aa8297c
-
SHA1
fcbb9f727565aa481a625cdd5009feedda4421e2
-
SHA256
daceb92e6eb1e44bc3be036b3857295dafe54126a49b6a65fdbd27b307cd924c
-
SHA512
d7e6f387622ab626cdadcb220b55f6ff165252526a5676f228a53db90d1972f1a606fb282066dff3a1a0f406a6e07b0d148237fb96f69700f19c69e1ccc202ba
-
SSDEEP
6144:gmo++9aEXsjjBW6nlUgH6Az8mZBRjggJ6b:Uj9aEcjj9J1Tv5J6b
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2896 MsDlClient.exe -
Executes dropped EXE 44 IoCs
pid Process 2724 MsDlClient.exe 2896 MsDlClient.exe 2664 MsDlClient.exe 2824 MsDlClient.exe 432 MsDlClient.exe 1296 MsDlClient.exe 1776 MsDlClient.exe 2960 MsDlClient.exe 1572 MsDlClient.exe 704 MsDlClient.exe 1184 MsDlClient.exe 2152 MsDlClient.exe 1704 MsDlClient.exe 964 MsDlClient.exe 1828 MsDlClient.exe 1940 MsDlClient.exe 2524 MsDlClient.exe 1484 MsDlClient.exe 2008 MsDlClient.exe 1692 MsDlClient.exe 1592 MsDlClient.exe 2200 MsDlClient.exe 2752 MsDlClient.exe 2052 MsDlClient.exe 2560 MsDlClient.exe 2640 MsDlClient.exe 2168 MsDlClient.exe 1992 MsDlClient.exe 2144 MsDlClient.exe 700 MsDlClient.exe 2460 MsDlClient.exe 2192 MsDlClient.exe 2356 MsDlClient.exe 2108 MsDlClient.exe 1948 MsDlClient.exe 1136 MsDlClient.exe 1292 MsDlClient.exe 1804 MsDlClient.exe 3024 MsDlClient.exe 1084 MsDlClient.exe 848 MsDlClient.exe 1912 MsDlClient.exe 884 MsDlClient.exe 960 MsDlClient.exe -
Loads dropped DLL 44 IoCs
pid Process 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 2896 MsDlClient.exe 2896 MsDlClient.exe 2824 MsDlClient.exe 2824 MsDlClient.exe 1296 MsDlClient.exe 1296 MsDlClient.exe 2960 MsDlClient.exe 2960 MsDlClient.exe 704 MsDlClient.exe 704 MsDlClient.exe 2152 MsDlClient.exe 2152 MsDlClient.exe 964 MsDlClient.exe 964 MsDlClient.exe 1940 MsDlClient.exe 1940 MsDlClient.exe 1484 MsDlClient.exe 1484 MsDlClient.exe 1692 MsDlClient.exe 1692 MsDlClient.exe 2200 MsDlClient.exe 2200 MsDlClient.exe 2052 MsDlClient.exe 2052 MsDlClient.exe 2640 MsDlClient.exe 2640 MsDlClient.exe 1992 MsDlClient.exe 1992 MsDlClient.exe 700 MsDlClient.exe 700 MsDlClient.exe 2192 MsDlClient.exe 2192 MsDlClient.exe 2108 MsDlClient.exe 2108 MsDlClient.exe 1136 MsDlClient.exe 1136 MsDlClient.exe 1804 MsDlClient.exe 1804 MsDlClient.exe 1084 MsDlClient.exe 1084 MsDlClient.exe 1912 MsDlClient.exe 1912 MsDlClient.exe -
Maps connected drives based on registry 3 TTPs 44 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDlClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe -
Drops file in System32 directory 44 IoCs
description ioc Process File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File opened for modification C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe File created C:\Windows\SysWOW64\MsDlClient.exe MsDlClient.exe -
Suspicious use of SetThreadContext 23 IoCs
description pid Process procid_target PID 844 set thread context of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 2724 set thread context of 2896 2724 MsDlClient.exe 32 PID 2664 set thread context of 2824 2664 MsDlClient.exe 34 PID 432 set thread context of 1296 432 MsDlClient.exe 36 PID 1776 set thread context of 2960 1776 MsDlClient.exe 38 PID 1572 set thread context of 704 1572 MsDlClient.exe 40 PID 1184 set thread context of 2152 1184 MsDlClient.exe 42 PID 1704 set thread context of 964 1704 MsDlClient.exe 44 PID 1828 set thread context of 1940 1828 MsDlClient.exe 46 PID 2524 set thread context of 1484 2524 MsDlClient.exe 48 PID 2008 set thread context of 1692 2008 MsDlClient.exe 50 PID 1592 set thread context of 2200 1592 MsDlClient.exe 52 PID 2752 set thread context of 2052 2752 MsDlClient.exe 54 PID 2560 set thread context of 2640 2560 MsDlClient.exe 56 PID 2168 set thread context of 1992 2168 MsDlClient.exe 59 PID 2144 set thread context of 700 2144 MsDlClient.exe 61 PID 2460 set thread context of 2192 2460 MsDlClient.exe 63 PID 2356 set thread context of 2108 2356 MsDlClient.exe 65 PID 1948 set thread context of 1136 1948 MsDlClient.exe 67 PID 1292 set thread context of 1804 1292 MsDlClient.exe 69 PID 3024 set thread context of 1084 3024 MsDlClient.exe 71 PID 848 set thread context of 1912 848 MsDlClient.exe 73 PID 884 set thread context of 960 884 MsDlClient.exe 75 -
resource yara_rule behavioral1/memory/1916-6-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-9-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-8-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-7-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-4-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-3-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-2-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1916-22-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2896-31-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2896-32-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2896-34-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2896-33-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2896-40-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2824-51-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2824-49-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2824-50-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2824-58-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1296-67-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1296-69-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1296-68-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1296-75-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2960-84-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2960-85-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2960-86-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2960-92-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/704-102-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/704-109-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2152-120-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2152-126-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/964-137-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/964-143-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1940-155-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1940-162-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1484-173-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1484-179-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1692-190-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1692-195-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2200-207-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2200-212-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2052-224-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2052-230-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2640-241-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2640-247-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1992-255-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1992-260-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/700-272-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2192-284-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/2108-296-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1136-308-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1804-320-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1084-329-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1084-333-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1912-342-0x0000000000400000-0x000000000046A000-memory.dmp upx behavioral1/memory/1912-346-0x0000000000400000-0x000000000046A000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 45 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDlClient.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 2896 MsDlClient.exe 2824 MsDlClient.exe 1296 MsDlClient.exe 2960 MsDlClient.exe 704 MsDlClient.exe 2152 MsDlClient.exe 964 MsDlClient.exe 1940 MsDlClient.exe 1484 MsDlClient.exe 1692 MsDlClient.exe 2200 MsDlClient.exe 2052 MsDlClient.exe 2640 MsDlClient.exe 1992 MsDlClient.exe 700 MsDlClient.exe 2192 MsDlClient.exe 2108 MsDlClient.exe 1136 MsDlClient.exe 1804 MsDlClient.exe 1084 MsDlClient.exe 1912 MsDlClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 844 wrote to memory of 1916 844 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 30 PID 1916 wrote to memory of 2724 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 31 PID 1916 wrote to memory of 2724 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 31 PID 1916 wrote to memory of 2724 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 31 PID 1916 wrote to memory of 2724 1916 fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe 31 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2724 wrote to memory of 2896 2724 MsDlClient.exe 32 PID 2896 wrote to memory of 2664 2896 MsDlClient.exe 33 PID 2896 wrote to memory of 2664 2896 MsDlClient.exe 33 PID 2896 wrote to memory of 2664 2896 MsDlClient.exe 33 PID 2896 wrote to memory of 2664 2896 MsDlClient.exe 33 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2664 wrote to memory of 2824 2664 MsDlClient.exe 34 PID 2824 wrote to memory of 432 2824 MsDlClient.exe 35 PID 2824 wrote to memory of 432 2824 MsDlClient.exe 35 PID 2824 wrote to memory of 432 2824 MsDlClient.exe 35 PID 2824 wrote to memory of 432 2824 MsDlClient.exe 35 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 432 wrote to memory of 1296 432 MsDlClient.exe 36 PID 1296 wrote to memory of 1776 1296 MsDlClient.exe 37 PID 1296 wrote to memory of 1776 1296 MsDlClient.exe 37 PID 1296 wrote to memory of 1776 1296 MsDlClient.exe 37 PID 1296 wrote to memory of 1776 1296 MsDlClient.exe 37 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 1776 wrote to memory of 2960 1776 MsDlClient.exe 38 PID 2960 wrote to memory of 1572 2960 MsDlClient.exe 39 PID 2960 wrote to memory of 1572 2960 MsDlClient.exe 39 PID 2960 wrote to memory of 1572 2960 MsDlClient.exe 39 PID 2960 wrote to memory of 1572 2960 MsDlClient.exe 39 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 1572 wrote to memory of 704 1572 MsDlClient.exe 40 PID 704 wrote to memory of 1184 704 MsDlClient.exe 41 PID 704 wrote to memory of 1184 704 MsDlClient.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Users\Admin\AppData\Local\Temp\fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fd87dbb5ac4f2e34d6d92ee71aa8297c_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Users\Admin\AppData\Local\Temp\FD87DB~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Users\Admin\AppData\Local\Temp\FD87DB~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:704 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1184 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2152 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1828 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1940 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1484 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1692 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2752 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2052 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2640 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2144 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:700 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2460 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2108 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1948 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1136 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1292 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1804 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1084 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1912 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\system32\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:884 -
C:\Windows\SysWOW64\MsDlClient.exe"C:\Windows\SysWOW64\MsDlClient.exe" C:\Windows\SysWOW64\MSDLCL~1.EXE46⤵
- Executes dropped EXE
PID:960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5fd87dbb5ac4f2e34d6d92ee71aa8297c
SHA1fcbb9f727565aa481a625cdd5009feedda4421e2
SHA256daceb92e6eb1e44bc3be036b3857295dafe54126a49b6a65fdbd27b307cd924c
SHA512d7e6f387622ab626cdadcb220b55f6ff165252526a5676f228a53db90d1972f1a606fb282066dff3a1a0f406a6e07b0d148237fb96f69700f19c69e1ccc202ba