Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
05-01-2025 15:14
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe
-
Size
244KB
-
MD5
aca82e949ab5af392482acacf334cb07
-
SHA1
a74a1cd1bebc9952eeb4d9ece7938d7785299727
-
SHA256
b56895ad77349d2e59946aa9abf61722715a1382e937e4176551dc285791623d
-
SHA512
f982dfb3be1e2d689d83fab7c8579eeee8d7845a8f29b47ab092abcf1e30a6d96e5685c11240cc9915a8fc57479d6d59f291f180786e7b6dc26d3796d901bcc9
-
SSDEEP
3072:WyQC2mC/zuw10GGQ++vroMTPjg/2Y2KfdkYq4vjC3IxbOaeOuMkBAOE6lLxSPNlm:jKuwvJUdkqjtbwqkmOVlLxSG
Malware Config
Signatures
-
GandCrab payload 4 IoCs
resource yara_rule behavioral1/memory/1704-258-0x0000000000400000-0x0000000000499000-memory.dmp family_gandcrab behavioral1/memory/1704-261-0x0000000000400000-0x0000000000499000-memory.dmp family_gandcrab behavioral1/memory/1704-259-0x0000000000290000-0x00000000002A7000-memory.dmp family_gandcrab behavioral1/memory/1704-268-0x0000000000400000-0x000000000042C000-memory.dmp family_gandcrab -
Gandcrab
Gandcrab is a Trojan horse that encrypts files on a computer.
-
Gandcrab family
-
Unexpected DNS network traffic destination 64 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
description ioc Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 104.155.138.21 Destination IP 107.178.223.183 Destination IP 107.178.223.183 -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\tyvwaizzxuz = "\"C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\jmqfhy.exe\"" JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\N: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\P: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\T: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\V: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\Z: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\B: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\J: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\L: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\M: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\R: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\S: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\Y: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\E: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\H: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\K: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\O: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\U: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\W: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\X: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\G: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\I: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe File opened (read-only) \??\Q: JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\win.ini JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nslookup.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1704 wrote to memory of 748 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 31 PID 1704 wrote to memory of 748 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 31 PID 1704 wrote to memory of 748 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 31 PID 1704 wrote to memory of 748 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 31 PID 1704 wrote to memory of 980 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 33 PID 1704 wrote to memory of 980 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 33 PID 1704 wrote to memory of 980 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 33 PID 1704 wrote to memory of 980 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 33 PID 1704 wrote to memory of 524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 35 PID 1704 wrote to memory of 524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 35 PID 1704 wrote to memory of 524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 35 PID 1704 wrote to memory of 524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 35 PID 1704 wrote to memory of 2384 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 37 PID 1704 wrote to memory of 2384 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 37 PID 1704 wrote to memory of 2384 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 37 PID 1704 wrote to memory of 2384 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 37 PID 1704 wrote to memory of 2520 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 39 PID 1704 wrote to memory of 2520 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 39 PID 1704 wrote to memory of 2520 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 39 PID 1704 wrote to memory of 2520 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 39 PID 1704 wrote to memory of 2080 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 41 PID 1704 wrote to memory of 2080 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 41 PID 1704 wrote to memory of 2080 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 41 PID 1704 wrote to memory of 2080 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 41 PID 1704 wrote to memory of 2452 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 43 PID 1704 wrote to memory of 2452 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 43 PID 1704 wrote to memory of 2452 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 43 PID 1704 wrote to memory of 2452 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 43 PID 1704 wrote to memory of 1528 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 45 PID 1704 wrote to memory of 1528 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 45 PID 1704 wrote to memory of 1528 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 45 PID 1704 wrote to memory of 1528 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 45 PID 1704 wrote to memory of 2416 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 47 PID 1704 wrote to memory of 2416 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 47 PID 1704 wrote to memory of 2416 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 47 PID 1704 wrote to memory of 2416 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 47 PID 1704 wrote to memory of 1524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 49 PID 1704 wrote to memory of 1524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 49 PID 1704 wrote to memory of 1524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 49 PID 1704 wrote to memory of 1524 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 49 PID 1704 wrote to memory of 2304 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 51 PID 1704 wrote to memory of 2304 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 51 PID 1704 wrote to memory of 2304 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 51 PID 1704 wrote to memory of 2304 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 51 PID 1704 wrote to memory of 1728 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 53 PID 1704 wrote to memory of 1728 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 53 PID 1704 wrote to memory of 1728 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 53 PID 1704 wrote to memory of 1728 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 53 PID 1704 wrote to memory of 2316 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 55 PID 1704 wrote to memory of 2316 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 55 PID 1704 wrote to memory of 2316 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 55 PID 1704 wrote to memory of 2316 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 55 PID 1704 wrote to memory of 1300 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 57 PID 1704 wrote to memory of 1300 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 57 PID 1704 wrote to memory of 1300 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 57 PID 1704 wrote to memory of 1300 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 57 PID 1704 wrote to memory of 2788 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 59 PID 1704 wrote to memory of 2788 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 59 PID 1704 wrote to memory of 2788 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 59 PID 1704 wrote to memory of 2788 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 59 PID 1704 wrote to memory of 2920 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 61 PID 1704 wrote to memory of 2920 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 61 PID 1704 wrote to memory of 2920 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 61 PID 1704 wrote to memory of 2920 1704 JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe 61
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_aca82e949ab5af392482acacf334cb07.exe"1⤵
- Adds Run key to start application
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:748
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:980
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2384
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2520
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2080
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2452
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1528
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1524
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1728
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2316
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2788
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2920
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2908
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2680
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2684
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2756
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2660
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2764
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1424
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2960
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2300
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:836
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1632
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2376
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:328
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1496
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2732
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:580
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2012
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2596
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1400
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:324
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:3064
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2108
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1252
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2484
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2260
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:316
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2308
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1148
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2792
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2948
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2900
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2700
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2716
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:676
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1204
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2616
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2860
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1492
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2532
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1652
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:3036
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2988
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:2088
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:392
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:1552
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2912
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:844
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2220
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1820
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2136
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2364
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:888
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1044
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1696
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2356
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2608
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵PID:1600
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2568
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵PID:2360
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵PID:2752
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2944
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns1.wowservers.ru2⤵PID:2940
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2772
-
-
C:\Windows\SysWOW64\nslookup.exenslookup carder.bit ns2.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:1856
-
-
C:\Windows\SysWOW64\nslookup.exenslookup ransomware.bit ns1.wowservers.ru2⤵
- System Location Discovery: System Language Discovery
PID:2824
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5f1ee245967da5592c9408796589deab2
SHA18e60cc17afcd01fa09266f79338fc1b342dd8568
SHA2563833b3815134157abec2a0145a010159ee7d695550326da6adc00f379fd64d2b
SHA512e4cb867cffe79646b97ffe568c44678c4307b75482eca234013e963f938da73723c1c362a8432641567b4d51f58f8c83610ad6cc6d9adf355fe4db3977e2927b