Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
01-01-2025 16:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe
-
Size
60KB
-
MD5
5c356ac02bcc70dcc5088272a977d0da
-
SHA1
3d66ab4f4bf989757dafcb6bc6672918bada6061
-
SHA256
3dcd15f5c8518d2785f5f0707207f6bd213d782765e8985be30e483bdd738d8e
-
SHA512
6547aa741b2f290e0a24eb24c80c284281b57fadbaaedc6ff0d1ed5b105342579b528822ede99ac0d6841ea1e5653198a98a99d86580c8bcb61b8c9ec75a0222
-
SSDEEP
768:23s+6jFw90iYiW1jQU9zKgEFQDqklFnBnibh9fOgKHcIS8YzXBBS8YzXBBzolKK:MngZv1j1PEFQDqkdibT+UFruFr3oUK
Malware Config
Signatures
-
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 60 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe restart" hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{8Y55WTT4-UID5-6LIB-FQF4-7288K0I67051} hkmg.exe -
Executes dropped EXE 28 IoCs
pid Process 2748 hkmg.exe 2736 hkmg.exe 2896 hkmg.exe 772 hkmg.exe 1692 hkmg.exe 2916 hkmg.exe 2868 hkmg.exe 1892 hkmg.exe 940 hkmg.exe 1100 hkmg.exe 3068 hkmg.exe 1824 hkmg.exe 828 hkmg.exe 2416 hkmg.exe 2180 hkmg.exe 1364 hkmg.exe 2008 hkmg.exe 2316 hkmg.exe 2744 hkmg.exe 3040 hkmg.exe 2696 hkmg.exe 236 hkmg.exe 2828 hkmg.exe 2796 hkmg.exe 2364 hkmg.exe 2076 hkmg.exe 2544 hkmg.exe 2224 hkmg.exe -
Loads dropped DLL 29 IoCs
pid Process 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe -
Adds Run key to start application 2 TTPs 60 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\bouls\\hkmg.exe" hkmg.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 59 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hkmg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2340 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 31 PID 2268 wrote to memory of 2340 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 31 PID 2268 wrote to memory of 2340 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 31 PID 2268 wrote to memory of 2340 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 31 PID 2268 wrote to memory of 2340 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 31 PID 2268 wrote to memory of 2000 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 32 PID 2268 wrote to memory of 2000 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 32 PID 2268 wrote to memory of 2000 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 32 PID 2268 wrote to memory of 2000 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 32 PID 2268 wrote to memory of 2000 2268 JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe 32 PID 2340 wrote to memory of 2748 2340 svchost.exe 33 PID 2340 wrote to memory of 2748 2340 svchost.exe 33 PID 2340 wrote to memory of 2748 2340 svchost.exe 33 PID 2340 wrote to memory of 2748 2340 svchost.exe 33 PID 2748 wrote to memory of 2876 2748 hkmg.exe 34 PID 2748 wrote to memory of 2876 2748 hkmg.exe 34 PID 2748 wrote to memory of 2876 2748 hkmg.exe 34 PID 2748 wrote to memory of 2876 2748 hkmg.exe 34 PID 2748 wrote to memory of 2876 2748 hkmg.exe 34 PID 2340 wrote to memory of 2736 2340 svchost.exe 35 PID 2340 wrote to memory of 2736 2340 svchost.exe 35 PID 2340 wrote to memory of 2736 2340 svchost.exe 35 PID 2340 wrote to memory of 2736 2340 svchost.exe 35 PID 2736 wrote to memory of 2140 2736 hkmg.exe 36 PID 2736 wrote to memory of 2140 2736 hkmg.exe 36 PID 2736 wrote to memory of 2140 2736 hkmg.exe 36 PID 2736 wrote to memory of 2140 2736 hkmg.exe 36 PID 2736 wrote to memory of 2140 2736 hkmg.exe 36 PID 2340 wrote to memory of 2896 2340 svchost.exe 37 PID 2340 wrote to memory of 2896 2340 svchost.exe 37 PID 2340 wrote to memory of 2896 2340 svchost.exe 37 PID 2340 wrote to memory of 2896 2340 svchost.exe 37 PID 2896 wrote to memory of 2624 2896 hkmg.exe 38 PID 2896 wrote to memory of 2624 2896 hkmg.exe 38 PID 2896 wrote to memory of 2624 2896 hkmg.exe 38 PID 2896 wrote to memory of 2624 2896 hkmg.exe 38 PID 2896 wrote to memory of 2624 2896 hkmg.exe 38 PID 2340 wrote to memory of 772 2340 svchost.exe 39 PID 2340 wrote to memory of 772 2340 svchost.exe 39 PID 2340 wrote to memory of 772 2340 svchost.exe 39 PID 2340 wrote to memory of 772 2340 svchost.exe 39 PID 772 wrote to memory of 1104 772 hkmg.exe 40 PID 772 wrote to memory of 1104 772 hkmg.exe 40 PID 772 wrote to memory of 1104 772 hkmg.exe 40 PID 772 wrote to memory of 1104 772 hkmg.exe 40 PID 772 wrote to memory of 1104 772 hkmg.exe 40 PID 2340 wrote to memory of 1692 2340 svchost.exe 41 PID 2340 wrote to memory of 1692 2340 svchost.exe 41 PID 2340 wrote to memory of 1692 2340 svchost.exe 41 PID 2340 wrote to memory of 1692 2340 svchost.exe 41 PID 1692 wrote to memory of 3000 1692 hkmg.exe 42 PID 1692 wrote to memory of 3000 1692 hkmg.exe 42 PID 1692 wrote to memory of 3000 1692 hkmg.exe 42 PID 1692 wrote to memory of 3000 1692 hkmg.exe 42 PID 1692 wrote to memory of 3000 1692 hkmg.exe 42 PID 2340 wrote to memory of 2916 2340 svchost.exe 43 PID 2340 wrote to memory of 2916 2340 svchost.exe 43 PID 2340 wrote to memory of 2916 2340 svchost.exe 43 PID 2340 wrote to memory of 2916 2340 svchost.exe 43 PID 2916 wrote to memory of 2972 2916 hkmg.exe 44 PID 2916 wrote to memory of 2972 2916 hkmg.exe 44 PID 2916 wrote to memory of 2972 2916 hkmg.exe 44 PID 2916 wrote to memory of 2972 2916 hkmg.exe 44 PID 2916 wrote to memory of 2972 2916 hkmg.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5c356ac02bcc70dcc5088272a977d0da.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2876
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2140
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2624
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:772 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1104
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:3000
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2972
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1464
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1892 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2384
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:940 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2084
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1348
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3068 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1164
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:612
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:828 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1540
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:856
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2180 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:3048
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1364 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2540
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2008 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1516
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2776
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2780
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2376
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:236 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1936
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2828 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2796 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1284
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2344
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2544 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:1076
-
-
-
C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"C:\Users\Admin\AppData\Roaming\bouls\hkmg.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵
- System Location Discovery: System Language Discovery
PID:2816
-
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵
- System Location Discovery: System Language Discovery
PID:2000
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5fb6b883ed51c2bf814b68f7f121cbcb7
SHA1ae47b613f89ba31040fffca5ab340d8404ce0003
SHA25625d3673bf8684e6f34cae4baa765dd19d05a3707feb7812dc4c5cdc67faac812
SHA51218b977aa174cc7d2f49cccb59c57fd3902faf764b3fe6ff117e916a173137df4b7ed8921822ee67b9deb7994f59a4c48f335a4c8a2827057f32292ff49ff9d10
-
Filesize
2B
MD584cad01fdb44ae58dbe6c3973dcd87f5
SHA14700b42849fb35be323774820bf1bc8019d26c80
SHA2568b1f194be530240c18bf0b1ee0d038e750fab8b24c6bd25c864297e5ebb41fa6
SHA5126e10d3ec4724c1aca9ff3f6a26292ba80065d18e8e9395f1474c0a298008f25e312e2f7024e7d10aab3264764e69a25553cc20afd23090f83921d20e42b989ab
-
Filesize
60KB
MD55c356ac02bcc70dcc5088272a977d0da
SHA13d66ab4f4bf989757dafcb6bc6672918bada6061
SHA2563dcd15f5c8518d2785f5f0707207f6bd213d782765e8985be30e483bdd738d8e
SHA5126547aa741b2f290e0a24eb24c80c284281b57fadbaaedc6ff0d1ed5b105342579b528822ede99ac0d6841ea1e5653198a98a99d86580c8bcb61b8c9ec75a0222