Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-01-2025 12:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
Resource
win10v2004-20241007-en
General
-
Target
JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe
-
Size
7.3MB
-
MD5
c884991c01d2854cd2d9b46f792207fc
-
SHA1
3f1549e8aaea2119361caa588d47de42aab0dc47
-
SHA256
914644da1b2f5c041a3199411b353f3c8e5b7e965399ac015bbc6c5286da7a7e
-
SHA512
0fade5bc588ea78f9dc589ca2c1223ae6141e6eae3af92a7d660f5343ebfb798b6de1c6011f52061ef2a2cc29800615420dbaaa68b7fac3f10b6a0a0a6da9669
-
SSDEEP
196608:9dm5Fdkyzf/xH8YRE4iQOr3asgZ9QHfz1afuVClmlB:9gPuybp5E4zO9Rc5ly
Malware Config
Extracted
loaderbot
http://qqpe4eb7.beget.tech/cmd.php
Extracted
redline
@zenvolord
185.209.22.181:29234
-
auth_value
5a0918bd3e8ede8e02c8dd9d106a996d
Signatures
-
Loaderbot family
-
RedLine
RedLine Stealer is a malware family written in C#, first appearing in early 2020.
-
RedLine payload 3 IoCs
resource yara_rule behavioral1/memory/1876-64-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1876-63-0x0000000000400000-0x000000000041E000-memory.dmp family_redline behavioral1/memory/1876-57-0x0000000000400000-0x000000000041E000-memory.dmp family_redline -
Redline family
-
XMRig Miner payload 3 IoCs
resource yara_rule behavioral1/memory/2784-47-0x0000000000D90000-0x0000000001590000-memory.dmp xmrig behavioral1/files/0x0008000000016d71-52.dat family_xmrig behavioral1/files/0x0008000000016d71-52.dat xmrig -
Xmrig family
-
LoaderBot executable 1 IoCs
resource yara_rule behavioral1/memory/2784-47-0x0000000000D90000-0x0000000001590000-memory.dmp loaderbot -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url dllhost.exe -
Executes dropped EXE 26 IoCs
pid Process 2820 VAPE V4.exe 2784 dllhost.exe 1832 Driver.exe 1716 Driver.exe 1728 Driver.exe 2672 Driver.exe 1756 Driver.exe 2348 Driver.exe 2852 Driver.exe 1788 Driver.exe 1848 Driver.exe 2940 Driver.exe 596 Driver.exe 1776 Driver.exe 940 Driver.exe 2712 Driver.exe 1284 Driver.exe 1480 Driver.exe 2968 Driver.exe 2852 Driver.exe 2696 Driver.exe 800 Driver.exe 2984 Driver.exe 1516 Driver.exe 2016 Driver.exe 1292 Driver.exe -
Loads dropped DLL 3 IoCs
pid Process 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 2784 dllhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3551809350-4263495960-1443967649-1000\Software\Microsoft\Windows\CurrentVersion\Run\Driver = "C:\\Users\\Admin\\AppData\\Roaming\\Sysfiles\\dllhost.exe" dllhost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 16 IoCs
pid Process 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 1876 2820 VAPE V4.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language VAPE V4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dllhost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AppLaunch.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2820 VAPE V4.exe 2820 VAPE V4.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe 2784 dllhost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2784 dllhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2784 dllhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2784 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 31 PID 2248 wrote to memory of 2784 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 31 PID 2248 wrote to memory of 2784 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 31 PID 2248 wrote to memory of 2784 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 31 PID 2248 wrote to memory of 2820 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 32 PID 2248 wrote to memory of 2820 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 32 PID 2248 wrote to memory of 2820 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 32 PID 2248 wrote to memory of 2820 2248 JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe 32 PID 2784 wrote to memory of 1832 2784 dllhost.exe 34 PID 2784 wrote to memory of 1832 2784 dllhost.exe 34 PID 2784 wrote to memory of 1832 2784 dllhost.exe 34 PID 2784 wrote to memory of 1832 2784 dllhost.exe 34 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2820 wrote to memory of 1876 2820 VAPE V4.exe 33 PID 2784 wrote to memory of 1716 2784 dllhost.exe 37 PID 2784 wrote to memory of 1716 2784 dllhost.exe 37 PID 2784 wrote to memory of 1716 2784 dllhost.exe 37 PID 2784 wrote to memory of 1716 2784 dllhost.exe 37 PID 2784 wrote to memory of 1728 2784 dllhost.exe 39 PID 2784 wrote to memory of 1728 2784 dllhost.exe 39 PID 2784 wrote to memory of 1728 2784 dllhost.exe 39 PID 2784 wrote to memory of 1728 2784 dllhost.exe 39 PID 2784 wrote to memory of 2672 2784 dllhost.exe 41 PID 2784 wrote to memory of 2672 2784 dllhost.exe 41 PID 2784 wrote to memory of 2672 2784 dllhost.exe 41 PID 2784 wrote to memory of 2672 2784 dllhost.exe 41 PID 2784 wrote to memory of 1756 2784 dllhost.exe 43 PID 2784 wrote to memory of 1756 2784 dllhost.exe 43 PID 2784 wrote to memory of 1756 2784 dllhost.exe 43 PID 2784 wrote to memory of 1756 2784 dllhost.exe 43 PID 2784 wrote to memory of 2348 2784 dllhost.exe 45 PID 2784 wrote to memory of 2348 2784 dllhost.exe 45 PID 2784 wrote to memory of 2348 2784 dllhost.exe 45 PID 2784 wrote to memory of 2348 2784 dllhost.exe 45 PID 2784 wrote to memory of 2852 2784 dllhost.exe 47 PID 2784 wrote to memory of 2852 2784 dllhost.exe 47 PID 2784 wrote to memory of 2852 2784 dllhost.exe 47 PID 2784 wrote to memory of 2852 2784 dllhost.exe 47 PID 2784 wrote to memory of 1788 2784 dllhost.exe 49 PID 2784 wrote to memory of 1788 2784 dllhost.exe 49 PID 2784 wrote to memory of 1788 2784 dllhost.exe 49 PID 2784 wrote to memory of 1788 2784 dllhost.exe 49 PID 2784 wrote to memory of 1848 2784 dllhost.exe 51 PID 2784 wrote to memory of 1848 2784 dllhost.exe 51 PID 2784 wrote to memory of 1848 2784 dllhost.exe 51 PID 2784 wrote to memory of 1848 2784 dllhost.exe 51 PID 2784 wrote to memory of 2940 2784 dllhost.exe 53 PID 2784 wrote to memory of 2940 2784 dllhost.exe 53 PID 2784 wrote to memory of 2940 2784 dllhost.exe 53 PID 2784 wrote to memory of 2940 2784 dllhost.exe 53 PID 2784 wrote to memory of 596 2784 dllhost.exe 55 PID 2784 wrote to memory of 596 2784 dllhost.exe 55 PID 2784 wrote to memory of 596 2784 dllhost.exe 55 PID 2784 wrote to memory of 596 2784 dllhost.exe 55 PID 2784 wrote to memory of 1776 2784 dllhost.exe 57 PID 2784 wrote to memory of 1776 2784 dllhost.exe 57 PID 2784 wrote to memory of 1776 2784 dllhost.exe 57
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_c884991c01d2854cd2d9b46f792207fc.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\dllhost.exe"C:\Users\Admin\AppData\Local\Temp\dllhost.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1832
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1716
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1728
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2672
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1756
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2348
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1788
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1848
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2940
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:596
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1776
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:940
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2712
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1284
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1480
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2852
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2696
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:800
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2984
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1516
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:2016
-
-
C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe"C:\Users\Admin\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 48VqBvWwx4DFvegwZp7dE7WpBeYWhdaZUF8BiWc6HdwsP89dK2tiqnHSuyyBjeSn9cZ2ZCMrVrVDkAhGNvCC44DKL2zvQn1 -p x -k -v=0 --donate-level=1 -t 43⤵
- Executes dropped EXE
PID:1292
-
-
-
C:\Users\Admin\AppData\Local\Temp\VAPE V4.exe"C:\Users\Admin\AppData\Local\Temp\VAPE V4.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4.6MB
MD5eda712f5cca6547e36d2937b9d89fad0
SHA1fb036b0995196539788ad0bcbce0bbb8d2db448e
SHA256860eabc945b4a99255e1bdbcfcc19a6ebf605612d809678ecd329e6f17c4f961
SHA5125ba2ea554cd25c2931a56bfdfd20da2c064c316841d5506178e44591fd67d356595a8a1d8243df753d2691de3e4e9b6bdeb6b979cbc72894f03c07b048aad6a7
-
Filesize
2.7MB
MD5d3b312dc4459edae7159835bcd374b9f
SHA1c4005eeae71227993aa8ddb05ef0fb0816568c25
SHA2564b515944cfb60f4fa648b09cd4f2556c3d77c381189f5e85fd6b6d9e20a974fd
SHA512019b87178e7051970b9868e37343e25e8a5875356b1a7053fee9eb80ff707195d06b8eae35faba066edfc463628f3298368964ab19a49e81d43c7a7fb2b29786
-
Filesize
4.6MB
MD54eef3a16234b50ad80f46b0928ec125d
SHA11dfc138538234f09bec31bebc2645733f34cc166
SHA2569709fb3d2694cd95a4e1f26ec6ae491a6cec56cac5e69840e9ad876b1053ff5a
SHA512311e7476596fc282d3940a702fb08c9192cb163a77a910f8b39043e39849fa7b1e48de135dcec9871871e651a5f491f06dd193ed788eadd10c63ac6678246208