Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
149s -
max time network
131s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/12/2024, 15:16
Static task
static1
Behavioral task
behavioral1
Sample
fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe
-
Size
528KB
-
MD5
fc0eed6b92b5874b37367f08538de1d1
-
SHA1
7c0d33e53b16c3a6803122e3fa6561d787041210
-
SHA256
c9f3a9caa9b0a67bca48ff6de615351465d0548ca32d7fdaf87dc19a011ff4f7
-
SHA512
1356e7f9c060d537f62cf3bb2b75c5ad3ab08b049d5ddd0059a5f405ebbfd0a0ecf40558799d05e2dcedaf99d566c451487d7de3135e7b561bf8bfb1d0915913
-
SSDEEP
12288:xjLgk4QdQLUq0JhMOuWqyEiPjF7OomtZkga:AEQIvJhMWxZVOomjk
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2568 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 1776 Windows Update.exe 7228 Windows Update.exe 7316 Windows Update.exe -
Loads dropped DLL 16 IoCs
pid Process 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 1776 Windows Update.exe 1776 Windows Update.exe 1776 Windows Update.exe 1776 Windows Update.exe 7228 Windows Update.exe 7228 Windows Update.exe 7228 Windows Update.exe 1776 Windows Update.exe 7316 Windows Update.exe 7316 Windows Update.exe 7316 Windows Update.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\Windows Update\\Windows Update.exe" reg.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 1260 set thread context of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 set thread context of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1776 set thread context of 7228 1776 Windows Update.exe 37 PID 1776 set thread context of 7316 1776 Windows Update.exe 38 PID 1776 set thread context of 8160 1776 Windows Update.exe 39 -
resource yara_rule behavioral1/memory/2916-1614-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2568-1613-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2568-1624-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/7228-3200-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/7228-3206-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/7316-3418-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2916-3415-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/7316-3848-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DllHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Windows Update.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "440696860" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{1007E9C1-BD53-11EF-9C44-E61828AB23DD} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe Token: SeDebugPrivilege 7316 Windows Update.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2764 DllHost.exe 8160 iexplore.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2568 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 1776 Windows Update.exe 7228 Windows Update.exe 7316 Windows Update.exe 8160 iexplore.exe 8160 iexplore.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE 2764 DllHost.exe 2764 DllHost.exe 2900 IEXPLORE.EXE 2900 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2568 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 30 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 1260 wrote to memory of 2916 1260 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 31 PID 2916 wrote to memory of 2656 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2656 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2656 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 33 PID 2916 wrote to memory of 2656 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 33 PID 2656 wrote to memory of 1644 2656 cmd.exe 35 PID 2656 wrote to memory of 1644 2656 cmd.exe 35 PID 2656 wrote to memory of 1644 2656 cmd.exe 35 PID 2656 wrote to memory of 1644 2656 cmd.exe 35 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 2916 wrote to memory of 1776 2916 fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe 36 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7228 1776 Windows Update.exe 37 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 7316 1776 Windows Update.exe 38 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39 PID 1776 wrote to memory of 8160 1776 Windows Update.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568
-
-
C:\Users\Admin\AppData\Local\Temp\fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fc0eed6b92b5874b37367f08538de1d1_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\IWWKL.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Windows Update" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1644
-
-
-
C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:7228
-
-
C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update\Windows Update.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:7316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:8160 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:8160 CREDAT:275457 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
-
-
-
C:\Windows\SysWOW64\DllHost.exeC:\Windows\SysWOW64\DllHost.exe /Processid:{76D0CB12-7604-4048-B83C-1005C7DDC503}1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
PID:2764
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b5c40121bcde19e6177b331081ae5d9e
SHA1cadc45d58df2c60aef96c76c39fac2b79a22bb58
SHA256f8aadaae771d25c975b9fa0070455e3fc44d1ac5833552829a894dc642028d50
SHA512ecb289bfa45bd6562f42893568a1f870641b61bc9bf7c285cb12a994cf8da8527e4e96e1ad39b66d20ce75b5cd41fddf1919974f44ad10f36ab548d1d1fb76f5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b880d5bae73c892521fb346fe146af3
SHA1a05698a9dc937aa9d9dc9b871af972d9c48170fd
SHA256a08110904b0fd324b5ab59d7b19b52447ac5e6d560145073345da9848c72926e
SHA5123424e5f7697e2113163869d5a1f3abf48a6bfda90896657ba053c40e9ef810343a962feb973212687364beb360c428a5c35d48fa763478931033292506a66ded
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56dd563d1ffcd4b3d7c51b9927abac5f0
SHA18f25d2ba61956f976db54cfd21769b7ad6f44476
SHA2560d5759483e236c2821670dd402a1fac48690d67618907f16203e9e5b1c83c3fd
SHA5120eb9597bb4fe488d59b47ea051f8415da7cf246ed6d9147d220d69893c4666ea0aaef3581170d4a735f6d6f8876351b699e9dc1fe7a93352abc1c68cc98d242d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5025dcb3578690b47a702311ecbb3931b
SHA13474dc9462e78373adf2b51de8388be7863c738e
SHA256322a6985cb93f8043dc7dd3287a84cafc7dc7620fc239cfd48c40157c935521e
SHA5124475ec14e9172edb69690c49ec23a79853af03a8cce92975446a95e82411b846cf42b4b32905c79226c7178923c5950abdfdc330f2fed59150eb8f072de4c51b
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5ef82dadc407bc21467b5b5fdbdc53b5f
SHA103fb0e8a5a777138c512a3d23741e3e7faed9e88
SHA2565fff21ba54b1cba3daafba1d4b084164fd12756accb40341723faa9440cd78b3
SHA512b250aca6470f5c7ab102dab48bd3bc5333d52801450da3b2f13a60715b8bc02cc88c16a539c57bd21934b9098d89a8d2f7086c885f9b3bcd5e21380d07eb6bd5
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e833e104219519be87098f7beef0914b
SHA1cb63ce9ef531ccf3170a79f628827be9f20a3c74
SHA2561f285e7188fcc1936fea8f60352c3774d01b265ad8485b90f5636735b224721c
SHA512ede9a23c3715e4a6f0460cf832c1f55a7e2eebfdb7b6b1ff96fb76fe389d44f258b48ce08ab57adea4b2643752cbbd36be6e88312e57f0524babfe6fcfd9a810
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5fc27c78c4f3faad1948b89cdda6df265
SHA14f72b1f0ac15f2baf3b799be8a85d67d08893ddf
SHA256bcf63bab5f1701f3b2993a5a78f5ff4548b9045bc670800039a7001fc0731a9e
SHA5123d3670153ebc14e9275e496e716d6b938a406eb747bcf2b21d2162f81bf6b07fc86bb4fe802af0922571b0a9bb2abd71325f36d3eb7f1240481a46a7cd073f2f
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5796708204b5ae5a7ad07b3b5b06ec057
SHA1c4bb5897aca63081ada57b73ef3ed680c508c9e7
SHA25631d8bd2809d3d27f29f09916c1fcbe8f0546f99661770778f2354620722af53a
SHA512403103b2d484b3c6b767929d1ef9e46fcf3a5bca91a450babaf4452d172f7cc83135922081bdfe436c78c4a2d43b95bc5efb69ae7f5a5c4171f1efa9f4117c27
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5924338ff00fe4c3831699990e2b23110
SHA163c1142daa7d3427914814890dc2657ec69957a3
SHA25660ef6a52162c56fb81f53787660ea73c1709994320df62ae51b15e3692df8144
SHA51220b5632251af96e57574be900690750c2f6f3a90f8bd20ba25afcb6ff96860a7dad73bdf7b24222bb236bbcd1a91123c29dc114524ae60eee74238c6056f499d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56520896c704fa44f7f02a32eedf01c5f
SHA1db9f2c7b56491e7747bc663013f1b4369cb7fed5
SHA25650336f5169b14ab70f38f52c4b8fe0022d090781b7a5433e7fd855c38ba8d3ec
SHA51217d6a32a9de1b071f280b0697b0cb2cd3866951221546fe99492802014d6264b110c4c1517e49a8e3752434b585b65ce8f65cab85cedc7631e949450a80acd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5d0f2c040e9911e2f6e1efd5be6758155
SHA1bc0736d7caa34e06b891031e0ed1e620dce601cc
SHA256cc5ca03e28cea2909e0924c984faf49ef1678e107df4de3a0bfea161ecbdda0d
SHA512859ec29558cccc9f0d1eed4e80ab61c822a2b0ed0799e06de10148002ee0c10e33ba8fe2300900261aaea1fa388398ccd209d673adbb3dbbe5c5db988f16029a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD582b47b7f97a7e9370381450157b7b82d
SHA14f002d789ddbc0cf78cd0cf72ec8f34f25b92115
SHA2566b18979d7b1dcb6458140b7d7f6d92e08b47ddce4c0672852684de66e5892c0e
SHA51271130edd6c518e158de7ec6b6599836fe5a0fdd6f5864136662048923d0f49859f90ae9846af1ef26c9924510dc9a1a1a8291268cd1de6aff173116153cd8a16
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5c78ce2c68068320d008ea24cb38e4c17
SHA190edcacc5baeaf07b99951e5353a61c97ed31a26
SHA2563d8faa11575656d4e76b2884e6f444b9e49e8b62b5e5ea6139b88d20c5f77531
SHA51235ac1921724e439da1593dda312abd5111dff05a68189874f69f7e64682532d27d98080b444dd989464e7e418ec74a5d95754e3ef23f8297fe483a29a75bfcfa
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55b3d8bb3ab8d75fbff1e76e3146f5035
SHA185bcef34019c91760006c1f3b023ffe94656c9ee
SHA256bea361d6f7e18f4717c71172a3ecb994b32685f267e3bf47246dba8892491d32
SHA512cd34853741d1da02bb4c3cea0c5838d64b993005b7a5693065caea46b59be0418da02b6ac0c829de573bd4fcee71bdc624d63a99d2a426d2d605dc174cead308
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56feb6eed8bf031a3c6739f3377064a18
SHA188038b325fdcb5b5700525a507458d5d5e97d6fb
SHA2563f13fcdd6d8d85def25f8d126655ce5631d348ef3d6eb3dcfdb12def2079d5c9
SHA512bd3f0d363f374e6c5e01d995c39da09d79d564dbceef4fe0305afb389c0cbf0d984175fd5abfc23bc4a28d0b3e5699863341fbe32671f0e4e76713cab19776cb
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5385fc6ac6bdd9bfccb503e1d6ba79908
SHA10b8b6243ac956596d10d7166910cc9357c2194ab
SHA25678afa48deb5e9d9591d80447f6c0cb1e76dc261cccf8adea43abdde2368f6cd8
SHA5128e4ce258f2c5f93e0e907091ffea59b991c55c1605f2aae48ef91fcf169070f570410409e16ed438332e3a7181425b7dfe0d2eff4bad05ec4718270abb7afee9
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD588a5e2a7e38b9612b26bb97e1e8698c2
SHA19334b2d42a104200be6557dd27926242055e036f
SHA25611bf2cbc8fb115908d74ad9ff43066137284cf7b1e1ff78b61cd418ace3a6a97
SHA512dcb440e9d0ad5efb921c0ebd959e7f83b2fa8cfe725c58fc1a905c3166a44318b5334d6e4ce7d1071f45ffea81e56d48a529235008a2b89b6424fd6d3a31ba58
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD51fd1d45305c938bb91781abd8c73af80
SHA1c0b04d658927e5b77d50be7244e6475e18819276
SHA2562faaa9f1137b26f53ce61df2a8187e593a2e8aa92bca5bded4b413c67c87c15d
SHA512b8761593788e3b3dd80c8a36ae241a8deb1da50127c7d5c849373bdbd4dcaeae778a10d99d90d4a6ae7d6e1b998de69c720707441d905ee8d3bf28b44759def8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5dbd4c0ee677652c3cb6ba8950b226da8
SHA19f8fef415ca2e3547b67fa0a092ca2b58d5ef663
SHA256444b5b89d3a0ee075c34286d00c2370d4a367c0fa4f3f82749eca3e3aafd1730
SHA5128ab1cb6b2760496ef099db15b571ce53625dba470294551c3ee3cc9591e8010db3c2de5907a2a7c5fdde239b64b2fbcd7ffc9b9caad102900eccff59562f76a0
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
165B
MD555078117cf471e8a8121dbc8f6d159bb
SHA15b19af55ad6ac1d5f7a9d6fd972d2785266f5e63
SHA256f62c2d6aa9e97285e74642e8d7b97dcb01221f73d93e829f220e116616034c6e
SHA5128a4950bf5162a1620246772a4a37632feb22748077702c9f8ee2e510d501be4ad3789f1d90f780d6d34525ec1ba51bf32d64ff4babd7e067cde55c4c690783d3
-
Filesize
10KB
MD5b88339034e7902b856a7a45c50869e01
SHA1181fe968e4c15f2dca6a241f552b6e955e5a0033
SHA256f927f4ffa26255b3f90d29fe426830744cc37671d69b57abb07f1e5e6f343371
SHA5121d1c327d63697465e5a4d9149e73cd75b723350e7af19bc0073ea2c0a4b56f67aadbe618d8444c4f678bcca98253e9b078aa8d881be296e2c3f42c3e787b3555
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
528KB
MD5fc0eed6b92b5874b37367f08538de1d1
SHA17c0d33e53b16c3a6803122e3fa6561d787041210
SHA256c9f3a9caa9b0a67bca48ff6de615351465d0548ca32d7fdaf87dc19a011ff4f7
SHA5121356e7f9c060d537f62cf3bb2b75c5ad3ab08b049d5ddd0059a5f405ebbfd0a0ecf40558799d05e2dcedaf99d566c451487d7de3135e7b561bf8bfb1d0915913
-
Filesize
528KB
MD5456baa19329d1451e293e4f885d3a284
SHA1f84b013ce459ef2fe5c702925de536bf1ff765e3
SHA25692afb92ed87f1c521f45b1805b596e7e76562ff59d47aea29d79858e9ae962d9
SHA51232e4eee1356f3966a53f1d2eab883f47bcb55a15cab0c9cae6a21ea33eb2047de0731cd275efcd298865fae502dcb1a92f50ccfc08bed46742ee88aab1fbd33d