Analysis
-
max time kernel
145s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09/01/2025, 19:19
Behavioral task
behavioral1
Sample
JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe
-
Size
6.0MB
-
MD5
d04352c69e8d56db5f9eb8f0b6573365
-
SHA1
21d7ec8a608f26756eb8531f3d51f7e0a63f7d8d
-
SHA256
40f9ef6921839b83373e8d981655b24f2b9c6d9b5b342d2bf621c8d6ea5528f8
-
SHA512
b341b0e0eeb9031ed17dcc490b6bbb74fb3f6b563a09c66ce59acc002967a86719d7ac1e31b30068277be0448672a35a330271ac74b032f6216e8fc93160ce41
-
SSDEEP
98304:blFqmwupyhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:bWJuMg53HRVu7vHDpS1IqBRU7kCs2q
Malware Config
Extracted
quasar
1.4.0
Chrome
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
chrome
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b6e-19.dat family_quasar behavioral2/memory/2448-40-0x00000000007A0000-0x0000000000824000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation chrome.exe -
Executes dropped EXE 17 IoCs
pid Process 2448 chrome.exe 1208 S^X.exe 332 chrome.exe 2076 chrome.exe 3948 chrome.exe 4164 chrome.exe 1920 chrome.exe 4700 chrome.exe 3204 chrome.exe 4024 chrome.exe 1072 chrome.exe 2876 chrome.exe 3660 chrome.exe 1472 chrome.exe 4184 chrome.exe 3852 chrome.exe 4920 chrome.exe -
Loads dropped DLL 1 IoCs
pid Process 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe -
resource yara_rule behavioral2/files/0x000b000000023b69-6.dat themida behavioral2/memory/4760-10-0x0000000072DB0000-0x00000000733B8000-memory.dmp themida behavioral2/memory/4760-12-0x0000000072DB0000-0x00000000733B8000-memory.dmp themida behavioral2/memory/4760-13-0x0000000072DB0000-0x00000000733B8000-memory.dmp themida behavioral2/memory/4760-39-0x0000000072DB0000-0x00000000733B8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S^X.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4604 PING.EXE 4584 PING.EXE 2592 PING.EXE 1512 PING.EXE 2908 PING.EXE 2708 PING.EXE 1984 PING.EXE 4952 PING.EXE 2280 PING.EXE 880 PING.EXE 3252 PING.EXE 1524 PING.EXE 2332 PING.EXE 2160 PING.EXE 1056 PING.EXE -
Runs ping.exe 1 TTPs 15 IoCs
pid Process 4584 PING.EXE 2908 PING.EXE 4952 PING.EXE 1524 PING.EXE 2160 PING.EXE 880 PING.EXE 1512 PING.EXE 2332 PING.EXE 2708 PING.EXE 1056 PING.EXE 4604 PING.EXE 3252 PING.EXE 1984 PING.EXE 2280 PING.EXE 2592 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3640 schtasks.exe 1412 schtasks.exe 4324 schtasks.exe 3828 schtasks.exe 4212 schtasks.exe 4996 schtasks.exe 4180 schtasks.exe 856 schtasks.exe 640 schtasks.exe 4248 schtasks.exe 3428 schtasks.exe 3900 schtasks.exe 3536 schtasks.exe 860 schtasks.exe 4256 schtasks.exe 4516 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 2448 chrome.exe Token: SeDebugPrivilege 332 chrome.exe Token: SeDebugPrivilege 1208 S^X.exe Token: SeDebugPrivilege 2076 chrome.exe Token: SeDebugPrivilege 3948 chrome.exe Token: SeDebugPrivilege 4164 chrome.exe Token: SeDebugPrivilege 1920 chrome.exe Token: SeDebugPrivilege 4700 chrome.exe Token: SeDebugPrivilege 3204 chrome.exe Token: SeDebugPrivilege 4024 chrome.exe Token: SeDebugPrivilege 1072 chrome.exe Token: SeDebugPrivilege 2876 chrome.exe Token: SeDebugPrivilege 3660 chrome.exe Token: SeDebugPrivilege 1472 chrome.exe Token: SeDebugPrivilege 4184 chrome.exe Token: SeDebugPrivilege 3852 chrome.exe Token: SeDebugPrivilege 4920 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4760 wrote to memory of 2448 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe 82 PID 4760 wrote to memory of 2448 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe 82 PID 4760 wrote to memory of 1208 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe 83 PID 4760 wrote to memory of 1208 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe 83 PID 4760 wrote to memory of 1208 4760 JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe 83 PID 2448 wrote to memory of 3640 2448 chrome.exe 84 PID 2448 wrote to memory of 3640 2448 chrome.exe 84 PID 2448 wrote to memory of 332 2448 chrome.exe 86 PID 2448 wrote to memory of 332 2448 chrome.exe 86 PID 332 wrote to memory of 4180 332 chrome.exe 87 PID 332 wrote to memory of 4180 332 chrome.exe 87 PID 332 wrote to memory of 3192 332 chrome.exe 89 PID 332 wrote to memory of 3192 332 chrome.exe 89 PID 3192 wrote to memory of 1472 3192 cmd.exe 91 PID 3192 wrote to memory of 1472 3192 cmd.exe 91 PID 3192 wrote to memory of 4604 3192 cmd.exe 92 PID 3192 wrote to memory of 4604 3192 cmd.exe 92 PID 3192 wrote to memory of 2076 3192 cmd.exe 98 PID 3192 wrote to memory of 2076 3192 cmd.exe 98 PID 2076 wrote to memory of 640 2076 chrome.exe 99 PID 2076 wrote to memory of 640 2076 chrome.exe 99 PID 2076 wrote to memory of 872 2076 chrome.exe 101 PID 2076 wrote to memory of 872 2076 chrome.exe 101 PID 872 wrote to memory of 4304 872 cmd.exe 103 PID 872 wrote to memory of 4304 872 cmd.exe 103 PID 872 wrote to memory of 3252 872 cmd.exe 104 PID 872 wrote to memory of 3252 872 cmd.exe 104 PID 872 wrote to memory of 3948 872 cmd.exe 107 PID 872 wrote to memory of 3948 872 cmd.exe 107 PID 3948 wrote to memory of 4248 3948 chrome.exe 108 PID 3948 wrote to memory of 4248 3948 chrome.exe 108 PID 3948 wrote to memory of 1380 3948 chrome.exe 110 PID 3948 wrote to memory of 1380 3948 chrome.exe 110 PID 1380 wrote to memory of 4420 1380 cmd.exe 112 PID 1380 wrote to memory of 4420 1380 cmd.exe 112 PID 1380 wrote to memory of 4584 1380 cmd.exe 113 PID 1380 wrote to memory of 4584 1380 cmd.exe 113 PID 1380 wrote to memory of 4164 1380 cmd.exe 115 PID 1380 wrote to memory of 4164 1380 cmd.exe 115 PID 4164 wrote to memory of 3428 4164 chrome.exe 117 PID 4164 wrote to memory of 3428 4164 chrome.exe 117 PID 4164 wrote to memory of 3576 4164 chrome.exe 119 PID 4164 wrote to memory of 3576 4164 chrome.exe 119 PID 3576 wrote to memory of 3652 3576 cmd.exe 121 PID 3576 wrote to memory of 3652 3576 cmd.exe 121 PID 3576 wrote to memory of 1984 3576 cmd.exe 122 PID 3576 wrote to memory of 1984 3576 cmd.exe 122 PID 3576 wrote to memory of 1920 3576 cmd.exe 123 PID 3576 wrote to memory of 1920 3576 cmd.exe 123 PID 1920 wrote to memory of 3900 1920 chrome.exe 124 PID 1920 wrote to memory of 3900 1920 chrome.exe 124 PID 1920 wrote to memory of 332 1920 chrome.exe 126 PID 1920 wrote to memory of 332 1920 chrome.exe 126 PID 332 wrote to memory of 1872 332 cmd.exe 128 PID 332 wrote to memory of 1872 332 cmd.exe 128 PID 332 wrote to memory of 4952 332 cmd.exe 129 PID 332 wrote to memory of 4952 332 cmd.exe 129 PID 332 wrote to memory of 4700 332 cmd.exe 130 PID 332 wrote to memory of 4700 332 cmd.exe 130 PID 4700 wrote to memory of 3536 4700 chrome.exe 131 PID 4700 wrote to memory of 3536 4700 chrome.exe 131 PID 4700 wrote to memory of 3320 4700 chrome.exe 133 PID 4700 wrote to memory of 3320 4700 chrome.exe 133 PID 3320 wrote to memory of 2556 3320 cmd.exe 135 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3640
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:4180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N6gPUuvUbhQb.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:1472
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4604
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ehaiXIBCcCis.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:4304
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3252
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:4248
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E6Rpvz7Gn7fI.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:4420
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4584
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4164 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:3428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\K8npeLxseK4m.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:3652
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1984
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:3900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LkJjqHtrzX6a.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:332 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:1872
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4952
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:3536
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\n7JTAzM7A4Zo.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\system32\chcp.comchcp 6500115⤵PID:2556
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1512
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3204 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:860
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3rMQXVyPAjfx.bat" "16⤵PID:2348
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:1028
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2908
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f18⤵
- Scheduled Task/Job: Scheduled Task
PID:1412
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QQMVA0wCenmL.bat" "18⤵PID:804
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:3472
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1524
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1072 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:4324
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BK8mAioLyqHM.bat" "20⤵PID:3012
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:4584
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2332
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:3828
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5lJLtI7B1x9T.bat" "22⤵PID:5032
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:2172
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2160
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3660 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f24⤵
- Scheduled Task/Job: Scheduled Task
PID:4212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DBTt1A6MNtAV.bat" "24⤵PID:2372
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:2620
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2280
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1472 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f26⤵
- Scheduled Task/Job: Scheduled Task
PID:4256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5hz5xccPxmiP.bat" "26⤵PID:4112
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:4696
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4184 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f28⤵
- Scheduled Task/Job: Scheduled Task
PID:4516
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bkoTd43Ab4B8.bat" "28⤵PID:1000
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:1532
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1056
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3852 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f30⤵
- Scheduled Task/Job: Scheduled Task
PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tArOJ6zKy16q.bat" "30⤵PID:3912
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:1412
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2592
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4920 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:856
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kLlJZ6RdlcPI.bat" "32⤵PID:804
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:4368
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:880
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\S^X.exe"C:\Users\Admin\AppData\Local\Temp\S^X.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1208
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
207B
MD52ca45df46dfd0689fce38b0f97156b3e
SHA19bdbeeabc82472c90bbed4d9998d1940cc13c5b9
SHA256774705c329844228d01e84165573aa7a053b0b73b9c037c8e1355ad83dcf181b
SHA5129fdd9618b209887e8f8693bf20187eac8af28239fb019e5acb815304c5ba99263d273b58aad73e5075c8fb7f65f10b15a8a727a351583ac509f7046c0084fbdc
-
Filesize
2.2MB
MD52d86c4ad18524003d56c1cb27c549ba8
SHA1123007f9337364e044b87deacf6793c2027c8f47
SHA256091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280
SHA5120dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c
-
Filesize
207B
MD5c4ff0ad55531d1f430b24cf5709789a5
SHA1fbdbcc6b00009b229fdc9970f138fd9f5caeb3b3
SHA256b0cf9413028ba92f47da4987140005b6c8492e6eed6aa8c182db290fdd4b732b
SHA512a662accb5b3688be2ee1fea60320d047b7c8b3a4069876ef5a61b5fb88e882bc9fddd720ab627a04a65d51d09767a218946f8a1491e5d1c24bd8dbc43fdcadd9
-
Filesize
207B
MD5ecfb053834691f9e5f04be16abe3fd8b
SHA1704f75e5490468f369315bcb904096decea3e0d7
SHA2565cc077e9ea7b16f5910ba917aec04fc9e92fe2b0288b41b34469a7d4f05c0f24
SHA51291bbe0c630c14dd62f9182b8a36c85be26ffca7027d11049b1871762cb2e876437d67bdf84fe5c64e3d543bc042ea615c21d0e56c17ee9c1171bf75e4702e631
-
Filesize
207B
MD59edb4ce0957207d9fdbc2025e6862591
SHA1380f5c2d857c63636935ff38495d0db2e7058841
SHA256ebc3f4d12c43f94d9fe387b0fa8b25f5c575db1cd47e123e26276fea9256e418
SHA51239ec85ddd9fbafbd376233bafd2587aacff5b35a09c38e97e7f22bf4f3dfa33fa68a5196b151b8e977c9308d19c81efb16f5139c273f926cfea059d184938405
-
Filesize
207B
MD53e6ccc80e9971eb4d50dc7348ebe9bb7
SHA183c14e985274c47b09a99cecd7a2fa8d4ca06e1d
SHA256481926761b9654870d1a4be485777f7cad9ac0063c4f8d62b4f829965e47ea20
SHA5126cca44816b390d08600120cab091ec96364d92a9dc00d89a7b4182303e386fe0341cd2c423f75e64f211a873c3e710942833d9fc96fc0a94a4777b60afee8a00
-
Filesize
207B
MD53b390b1400b0d5cca2ffc259015d0f61
SHA1f85c0f2022ffb156e59db637ed6e7fd51628f8fd
SHA256e42d97c2907c7d677bbcd62a615dff10e6c88b10c64ac8ab3b170d336fe61638
SHA5122c5cd884bed43f240a25adbd35a0c5b51b4052b32e92ebdce68cbf7f5453a664158a9bc3458d0e35de879a315e9599ddb3d8aa04d9b3d69fbfa9f9c54476edf5
-
Filesize
207B
MD53673b31c503ac812e137de7e8b19abdf
SHA1a39704e05685d5e5f3999aeda453a62cb9d73d9a
SHA25679153f419c8efafb1e8d34a9ac7805a58ee7af517d4b257a4b9fd3493f2d2191
SHA512f12dee17e7fe8784572806a7204d1cf1f3b1d5389abf9a0721d69284104f4926ebac36e6f9b0948f23a8a30c73b19c13e91f131756c9daf1ca19350c64a07466
-
Filesize
207B
MD56bc720b2389b420deebe99611afec661
SHA1cdcdca9d8f6fc16b6b4dfd990bc186680c5e0f79
SHA25622a83b0d5ee2808aec6567fb56a1f9c14d149c15f10a771bf37d6c7921573ca9
SHA512696476942f5a723449516747cf09341a54333497516454a47d26e6a02610778b77f218d59095592f11a1add0e8ed06b20b7bd8635bae68758dd4fd34e2c5eb26
-
Filesize
207B
MD5eeda8b9121b3e18baa25fb89dccc49de
SHA193e2fc6368d0257bac1945fc355dd2282402ceec
SHA256d563e967f0e7aac4b0c6e45d6baf31be6c92eaec99876daba7269e3202077150
SHA512e031cf13448667d5334ffe71c8b87af4d66ae2f0b9d17ed33a2754fc03ed9fd17eecf1b6119a5b065bb58673fb625568c67475ea5aa449892b55b555bb578ef2
-
Filesize
207B
MD5fbb92643a548bc7aa4e5a2390a6da9f0
SHA16eacffa05ab7e8f8d72c2457c4f22ed353bb1e32
SHA2566c0e27a161002fd71fa88faf07486af023a01d72bc9d4469c495494fe6bda8b1
SHA512d6026ffdf853dc87cde30e1e3b7dcaeb219bb0dd3d27c042e87877d8d0ced49057e70f6f1e6eafd20f86aeceb0041c3af5da4e2f7bc0c5ed2ea80845cf9c3acd
-
Filesize
789KB
MD5e2437ac017506bbde9a81fb1f618457b
SHA1adef2615312b31e041ccf700b3982dd50b686c7f
SHA25694594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12
SHA5129169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019
-
Filesize
207B
MD5e2eeada74a20844044a41fed25035d42
SHA146bd41f26cb34737db5eb9230a871de02879648d
SHA25607f25d067ca88b2df18dcf2abeab39c4f57d79c2faf2bd8a6270516b72ef7ae3
SHA5127df96ca0326f72680894d829dbf5e539f3809d07b16ef833ced0b9a3af5bca8c39502b2299bd16e25136b103b31341967a78a12b93a926f10089e7c3b212c531
-
Filesize
207B
MD5db2b9b5a5ba0b7535ff764d723e40dcb
SHA13eb1800addd908961459278a23296d6690d6db11
SHA256abd128666922c233d47fde3ffa5b6ae8fe4b3226af8248aac89568f2e1c3d06d
SHA512d1dc9eed660323b1d7a114fb3e2f43fa22b5a0272b1ebd265996b61950d8339090499630055f8273369b416aac10a243d79136727e6b89304c255bb5f9387cae
-
Filesize
207B
MD546743416795b175bf7020f85a0e5ec12
SHA11184c031d8e95583593e8d4ef99304976713f6af
SHA2569ebcdbff07b4682cc01c435dae15151dbb7c6ba6047051300b36d0e36be0c3cf
SHA512689ce271add7699946d5be967e1b0e20d507790bb4eb4cdf4b0c939d1e1d11e72f22bf7cec3ac3cd968b4acd93c0af044e426df3132f04138597273927e6beca
-
Filesize
207B
MD5126fb490d8802fe6fe516186e361eb1f
SHA1bac36955bf5649465dd79ac22441c9eea8ace9ca
SHA256f9eb7b94aa7525b43dfa953bf3611932fcfc64e34fbcdf797e2e71956fd093d0
SHA512ac46689ef6eaf787327f166fa00efd0c260961d940fc93d2bf02661d133fbd5b2546e4449fdbae975ba9d9b4ae12989e3f7dee8226456bd34c802b0fdfa366e9
-
Filesize
207B
MD50dcd894409868c4526de8c957941c069
SHA13a5d3614aff5b7ef351a1e853b72ac31293e10a0
SHA256a6defd533332171c425d59451ae415e274c8374f226b8499ae41cfffaa980718
SHA5123ad7acf252f42fba108ce5907f11aedc6619bb39ce1a7438289c0501c9c1d2666aa29d5767cc5b60a07430fd5c3b49aac5c860e715d8a59807c1319ef7ff067f
-
Filesize
502KB
MD592479f1615fd4fa1dd3ac7f2e6a1b329
SHA10a6063d27c9f991be2053b113fcef25e071c57fd
SHA2560c4917cc756e769e94ab97d626bef49713dab833525ba2e5d75fc9aea4c72569
SHA5129f117c74c04749e6d0142e1cf952a8c59428f649413750921fc7aea35a3ccb62d9975ef954e61ce323d6234e0e9c7b8816f2ca9270552b726f9233219750847c