Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
01/01/2025, 12:31
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe
-
Size
401KB
-
MD5
553557ef2951e5961f072119afd6e9d0
-
SHA1
bad2d5bf60655ba2cb0f8f64b8cb46ad25923c2b
-
SHA256
a7ac41929b98d6a98facd3126cef7c77c004b6851e5ebf94046d0457549220f0
-
SHA512
d89a9bd414f5466c5c69aafb1f9e61aaa36a60afe8b53fc6695ff829693715ff65ffcfcdf0e955cb2e72eb85e3ac94d194f2fb86c325870533302875dff48f7e
-
SSDEEP
3072:fT2xNfzEmPUac0yCRS9EK0TLmf8HVt1up3H1kvco0OjMsdbxloEGpfcCwOqL5pdb:7kPpe0m0HVt16IloEGRcCwhrkTlPfg
Malware Config
Signatures
-
Ramnit family
-
Executes dropped EXE 3 IoCs
pid Process 4336 JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe 4116 WaterMark.exe 2564 WaterMark.exe -
resource yara_rule behavioral2/memory/4336-19-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4448-44-0x0000000000400000-0x0000000000471000-memory.dmp upx behavioral2/memory/4116-40-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4448-49-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4116-39-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4116-34-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/2564-57-0x0000000000400000-0x000000000043E000-memory.dmp upx behavioral2/memory/4336-23-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4336-21-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4336-20-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4448-14-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4448-8-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4448-9-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4448-7-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-62-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4116-61-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/2564-66-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral2/memory/4116-71-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe File opened for modification C:\Program Files (x86)\Microsoft\px7426.tmp JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe File created C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\WaterMark.exe JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe File opened for modification C:\Program Files (x86)\Microsoft\px74D2.tmp JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 404 1140 WerFault.exe 4928 1472 WerFault.exe 89 -
System Location Discovery: System Language Discovery 1 TTPs 6 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "758320619" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3e0000003e000000c4040000a3020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLHighDateTime = "50" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "442499673" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "758164513" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{58B8D329-C83C-11EF-ADF2-E26222BAF6A3} = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153225" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastTTLLowDateTime = "1251635200" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "758164513" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "759727004" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateLowDateTime = "759727004" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\GPU\AdapterInfo = "vendorId=\"0x10de\",deviceID=\"0x8c\",subSysID=\"0x0\",revision=\"0x0\",version=\"10.0.19041.546\"hypervisor=\"No Hypervisor (No SLAT)\"" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153225" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153225" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153225" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\AdminActive\{58BB3546-C83C-11EF-ADF2-E26222BAF6A3} = "0" iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\VersionManager iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateHighDateTime = "31153225" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastUpdateLowDateTime = "758320619" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\SOFTWARE\Microsoft\Internet Explorer\VersionManager\LastCheckForUpdateHighDateTime = "31153225" iexplore.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 4116 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe 2564 WaterMark.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4116 WaterMark.exe Token: SeDebugPrivilege 2564 WaterMark.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2556 iexplore.exe 1996 iexplore.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2556 iexplore.exe 2556 iexplore.exe 1996 iexplore.exe 1996 iexplore.exe 968 IEXPLORE.EXE 968 IEXPLORE.EXE 720 IEXPLORE.EXE 720 IEXPLORE.EXE 968 IEXPLORE.EXE 968 IEXPLORE.EXE -
Suspicious use of UnmapMainImage 4 IoCs
pid Process 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 4336 JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe 4116 WaterMark.exe 2564 WaterMark.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 4448 wrote to memory of 4336 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 82 PID 4448 wrote to memory of 4336 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 82 PID 4448 wrote to memory of 4336 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 82 PID 4336 wrote to memory of 4116 4336 JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe 83 PID 4336 wrote to memory of 4116 4336 JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe 83 PID 4336 wrote to memory of 4116 4336 JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe 83 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4116 wrote to memory of 1140 4116 WaterMark.exe 84 PID 4448 wrote to memory of 2564 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 88 PID 4448 wrote to memory of 2564 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 88 PID 4448 wrote to memory of 2564 4448 JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe 88 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 2564 wrote to memory of 1472 2564 WaterMark.exe 89 PID 4116 wrote to memory of 1996 4116 WaterMark.exe 92 PID 4116 wrote to memory of 1996 4116 WaterMark.exe 92 PID 4116 wrote to memory of 2556 4116 WaterMark.exe 93 PID 4116 wrote to memory of 2556 4116 WaterMark.exe 93 PID 2556 wrote to memory of 968 2556 iexplore.exe 94 PID 2556 wrote to memory of 968 2556 iexplore.exe 94 PID 2556 wrote to memory of 968 2556 iexplore.exe 94 PID 1996 wrote to memory of 720 1996 iexplore.exe 95 PID 1996 wrote to memory of 720 1996 iexplore.exe 95 PID 1996 wrote to memory of 720 1996 iexplore.exe 95 PID 2564 wrote to memory of 5104 2564 WaterMark.exe 96 PID 2564 wrote to memory of 5104 2564 WaterMark.exe 96 PID 2564 wrote to memory of 3960 2564 WaterMark.exe 97 PID 2564 wrote to memory of 3960 2564 WaterMark.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_553557ef2951e5961f072119afd6e9d0.exe"1⤵
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4448 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_553557ef2951e5961f072119afd6e9d0mgr.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4336 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:4116 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:1140
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1140 -s 2045⤵
- Program crash
PID:404
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1996 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:720
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2556 CREDAT:17410 /prefetch:25⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:968
-
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:1472
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 2044⤵
- Program crash
PID:4928
-
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
PID:5104
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵
- Modifies Internet Explorer settings
PID:3960
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1140 -ip 11401⤵PID:2132
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 1472 -ip 14721⤵PID:428
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
199KB
MD5812735a71b8070f515cdccef127b7f60
SHA1def1a18114afa6311fabfdb04e2b56a024ed89dc
SHA25682b4b89a73093c016bdc3dd558f39419c85c28b1384e3da1efd51f8906a54153
SHA512a386d6ac77704fba096220ea499ba90780d8ceca57d86810e984533a92b86782fcf2429684dd5de60e62fe793cd4b1e17c8212fb7bd185feecb8fb73436bf590
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize471B
MD530f59b20e935520badc298242cb4cff1
SHA100622b2054eb148a8459c2ccd0b22606c2d5c7f6
SHA2564a981d199e551f2b8c8fa22f0e3fbc264e876e5ed243d83331b2a6083a753e3c
SHA512f22ca09eb3266cee3f363e4f3f955745382679d136d61e7c27f81081cd77efa5f82f82220526928f73049e692b7c060f64032dfae0f967c579c6e6acfd2e8d21
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7423F88C7F265F0DEFC08EA88C3BDE45_AA1E8580D4EBC816148CE81268683776
Filesize404B
MD5c9e04b20e4a022d5f4ed56b6188ff22c
SHA1e8067065c7c274b04401336f34979a86fe836536
SHA256b1da073b883a22917b453e66f1a404faa040c025c889ca7b20f560d931bd1bc8
SHA51203c78744051099a778a747a14ad7cc5d427be2e31f994d2e39fbab4ad91f8403a0b91e530474417aa463a87ea29b6b960dbf5bd4129b7edf22a37148d1170f5b
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{58B8D329-C83C-11EF-ADF2-E26222BAF6A3}.dat
Filesize3KB
MD548b143fe10c577d6152ce858fb3d3863
SHA197988e9b66a763db068ce26dd4bfab5cee404e47
SHA256a3c7e261d820618c98554f1ca65ae9ebd422f75ad1c9b569681a7dc831046737
SHA5128c0c362a6b92ed6523ac22fbc29ae2d81e635b6196f2e958656d042b6dd18a7d85a2564a0ec785a43e3f060078815b6618b60626d14c93270f7fac0b26447dd2
-
C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\Recovery\High\Active\RecoveryStore.{58BB3546-C83C-11EF-ADF2-E26222BAF6A3}.dat
Filesize5KB
MD504b07ef54e592bd2b77d2ca34ed2948f
SHA1e0e4bae67d493dfe3e130132afc55f20d21ee3e8
SHA25633eee024f472417213659e727711a2e27b3d33461059eb4fd4436989130a0496
SHA5121bca264ac11410686dcdcb59e6fc42c3d812eeb3db5e81c94d07884790d5bf0b437a2225ea782c5b3208828cda1b8a39901edd3a9fff3a952895cf67089770e8
-
Filesize
15KB
MD51a545d0052b581fbb2ab4c52133846bc
SHA162f3266a9b9925cd6d98658b92adec673cbe3dd3
SHA256557472aeaebf4c1c800b9df14c190f66d62cbabb011300dbedde2dcddd27a6c1
SHA512bd326d111589d87cd6d019378ec725ac9ac7ad4c36f22453941f7d52f90b747ede4783a83dfff6cae1b3bb46690ad49cffa77f2afda019b22863ac485b406e8d
-
Filesize
17KB
MD55a34cb996293fde2cb7a4ac89587393a
SHA13c96c993500690d1a77873cd62bc639b3a10653f
SHA256c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad
SHA512e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee