Analysis

  • max time kernel
    145s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09/01/2025, 19:19

General

  • Target

    JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe

  • Size

    6.0MB

  • MD5

    d04352c69e8d56db5f9eb8f0b6573365

  • SHA1

    21d7ec8a608f26756eb8531f3d51f7e0a63f7d8d

  • SHA256

    40f9ef6921839b83373e8d981655b24f2b9c6d9b5b342d2bf621c8d6ea5528f8

  • SHA512

    b341b0e0eeb9031ed17dcc490b6bbb74fb3f6b563a09c66ce59acc002967a86719d7ac1e31b30068277be0448672a35a330271ac74b032f6216e8fc93160ce41

  • SSDEEP

    98304:blFqmwupyhcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qo:bWJuMg53HRVu7vHDpS1IqBRU7kCs2q

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Chrome

C2

live.nodenet.ml:8863

Mutex

754ce6d6-f75b-4c6f-964c-3996e749369e

Attributes
  • encryption_key

    8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D

  • install_name

    chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System

  • subdirectory

    chrome

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 1 IoCs
  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_d04352c69e8d56db5f9eb8f0b6573365.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4760
    • C:\Users\Admin\AppData\Roaming\chrome.exe
      "C:\Users\Admin\AppData\Roaming\chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:3640
      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:332
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:4180
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\N6gPUuvUbhQb.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Windows\system32\chcp.com
            chcp 65001
            5⤵
              PID:1472
            • C:\Windows\system32\PING.EXE
              ping -n 10 localhost
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:4604
            • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
              "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2076
              • C:\Windows\SYSTEM32\schtasks.exe
                "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:640
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\ehaiXIBCcCis.bat" "
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:872
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  7⤵
                    PID:4304
                  • C:\Windows\system32\PING.EXE
                    ping -n 10 localhost
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:3252
                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                    7⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3948
                    • C:\Windows\SYSTEM32\schtasks.exe
                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                      8⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:4248
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\E6Rpvz7Gn7fI.bat" "
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1380
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        9⤵
                          PID:4420
                        • C:\Windows\system32\PING.EXE
                          ping -n 10 localhost
                          9⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:4584
                        • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                          "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                          9⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:4164
                          • C:\Windows\SYSTEM32\schtasks.exe
                            "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                            10⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:3428
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\K8npeLxseK4m.bat" "
                            10⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3576
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              11⤵
                                PID:3652
                              • C:\Windows\system32\PING.EXE
                                ping -n 10 localhost
                                11⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:1984
                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                11⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:1920
                                • C:\Windows\SYSTEM32\schtasks.exe
                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                  12⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:3900
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LkJjqHtrzX6a.bat" "
                                  12⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:332
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    13⤵
                                      PID:1872
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      13⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:4952
                                    • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                      "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                      13⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:4700
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                        14⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3536
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\n7JTAzM7A4Zo.bat" "
                                        14⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:3320
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          15⤵
                                            PID:2556
                                          • C:\Windows\system32\PING.EXE
                                            ping -n 10 localhost
                                            15⤵
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            • Runs ping.exe
                                            PID:1512
                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                            15⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:3204
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                              16⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:860
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3rMQXVyPAjfx.bat" "
                                              16⤵
                                                PID:2348
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  17⤵
                                                    PID:1028
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    17⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:2908
                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                    17⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:4024
                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                      18⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:1412
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QQMVA0wCenmL.bat" "
                                                      18⤵
                                                        PID:804
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          19⤵
                                                            PID:3472
                                                          • C:\Windows\system32\PING.EXE
                                                            ping -n 10 localhost
                                                            19⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:1524
                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                            19⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1072
                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                              20⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:4324
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\BK8mAioLyqHM.bat" "
                                                              20⤵
                                                                PID:3012
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  21⤵
                                                                    PID:4584
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    21⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:2332
                                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                    21⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2876
                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                      22⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3828
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5lJLtI7B1x9T.bat" "
                                                                      22⤵
                                                                        PID:5032
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          23⤵
                                                                            PID:2172
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            23⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:2160
                                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                            23⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:3660
                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                              24⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:4212
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\DBTt1A6MNtAV.bat" "
                                                                              24⤵
                                                                                PID:2372
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  25⤵
                                                                                    PID:2620
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    25⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:2280
                                                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                    25⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1472
                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                      26⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:4256
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\5hz5xccPxmiP.bat" "
                                                                                      26⤵
                                                                                        PID:4112
                                                                                        • C:\Windows\system32\chcp.com
                                                                                          chcp 65001
                                                                                          27⤵
                                                                                            PID:4696
                                                                                          • C:\Windows\system32\PING.EXE
                                                                                            ping -n 10 localhost
                                                                                            27⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:2708
                                                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                            27⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:4184
                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                              28⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:4516
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\bkoTd43Ab4B8.bat" "
                                                                                              28⤵
                                                                                                PID:1000
                                                                                                • C:\Windows\system32\chcp.com
                                                                                                  chcp 65001
                                                                                                  29⤵
                                                                                                    PID:1532
                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                    ping -n 10 localhost
                                                                                                    29⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Runs ping.exe
                                                                                                    PID:1056
                                                                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                    29⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:3852
                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                      30⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:4996
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tArOJ6zKy16q.bat" "
                                                                                                      30⤵
                                                                                                        PID:3912
                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                          chcp 65001
                                                                                                          31⤵
                                                                                                            PID:1412
                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                            ping -n 10 localhost
                                                                                                            31⤵
                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                            • Runs ping.exe
                                                                                                            PID:2592
                                                                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                            31⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:4920
                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                              32⤵
                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                              PID:856
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\kLlJZ6RdlcPI.bat" "
                                                                                                              32⤵
                                                                                                                PID:804
                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                  chcp 65001
                                                                                                                  33⤵
                                                                                                                    PID:4368
                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                    ping -n 10 localhost
                                                                                                                    33⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:880
                                                    • C:\Users\Admin\AppData\Local\Temp\S^X.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\S^X.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1208

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chrome.exe.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    baf55b95da4a601229647f25dad12878

                                                    SHA1

                                                    abc16954ebfd213733c4493fc1910164d825cac8

                                                    SHA256

                                                    ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                    SHA512

                                                    24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                  • C:\Users\Admin\AppData\Local\Temp\3rMQXVyPAjfx.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    2ca45df46dfd0689fce38b0f97156b3e

                                                    SHA1

                                                    9bdbeeabc82472c90bbed4d9998d1940cc13c5b9

                                                    SHA256

                                                    774705c329844228d01e84165573aa7a053b0b73b9c037c8e1355ad83dcf181b

                                                    SHA512

                                                    9fdd9618b209887e8f8693bf20187eac8af28239fb019e5acb815304c5ba99263d273b58aad73e5075c8fb7f65f10b15a8a727a351583ac509f7046c0084fbdc

                                                  • C:\Users\Admin\AppData\Local\Temp\45b8c97f-5cf8-49f5-b76c-0fc91adff9fb\AgileDotNetRT.dll

                                                    Filesize

                                                    2.2MB

                                                    MD5

                                                    2d86c4ad18524003d56c1cb27c549ba8

                                                    SHA1

                                                    123007f9337364e044b87deacf6793c2027c8f47

                                                    SHA256

                                                    091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280

                                                    SHA512

                                                    0dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c

                                                  • C:\Users\Admin\AppData\Local\Temp\5hz5xccPxmiP.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    c4ff0ad55531d1f430b24cf5709789a5

                                                    SHA1

                                                    fbdbcc6b00009b229fdc9970f138fd9f5caeb3b3

                                                    SHA256

                                                    b0cf9413028ba92f47da4987140005b6c8492e6eed6aa8c182db290fdd4b732b

                                                    SHA512

                                                    a662accb5b3688be2ee1fea60320d047b7c8b3a4069876ef5a61b5fb88e882bc9fddd720ab627a04a65d51d09767a218946f8a1491e5d1c24bd8dbc43fdcadd9

                                                  • C:\Users\Admin\AppData\Local\Temp\5lJLtI7B1x9T.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    ecfb053834691f9e5f04be16abe3fd8b

                                                    SHA1

                                                    704f75e5490468f369315bcb904096decea3e0d7

                                                    SHA256

                                                    5cc077e9ea7b16f5910ba917aec04fc9e92fe2b0288b41b34469a7d4f05c0f24

                                                    SHA512

                                                    91bbe0c630c14dd62f9182b8a36c85be26ffca7027d11049b1871762cb2e876437d67bdf84fe5c64e3d543bc042ea615c21d0e56c17ee9c1171bf75e4702e631

                                                  • C:\Users\Admin\AppData\Local\Temp\BK8mAioLyqHM.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    9edb4ce0957207d9fdbc2025e6862591

                                                    SHA1

                                                    380f5c2d857c63636935ff38495d0db2e7058841

                                                    SHA256

                                                    ebc3f4d12c43f94d9fe387b0fa8b25f5c575db1cd47e123e26276fea9256e418

                                                    SHA512

                                                    39ec85ddd9fbafbd376233bafd2587aacff5b35a09c38e97e7f22bf4f3dfa33fa68a5196b151b8e977c9308d19c81efb16f5139c273f926cfea059d184938405

                                                  • C:\Users\Admin\AppData\Local\Temp\DBTt1A6MNtAV.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    3e6ccc80e9971eb4d50dc7348ebe9bb7

                                                    SHA1

                                                    83c14e985274c47b09a99cecd7a2fa8d4ca06e1d

                                                    SHA256

                                                    481926761b9654870d1a4be485777f7cad9ac0063c4f8d62b4f829965e47ea20

                                                    SHA512

                                                    6cca44816b390d08600120cab091ec96364d92a9dc00d89a7b4182303e386fe0341cd2c423f75e64f211a873c3e710942833d9fc96fc0a94a4777b60afee8a00

                                                  • C:\Users\Admin\AppData\Local\Temp\E6Rpvz7Gn7fI.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    3b390b1400b0d5cca2ffc259015d0f61

                                                    SHA1

                                                    f85c0f2022ffb156e59db637ed6e7fd51628f8fd

                                                    SHA256

                                                    e42d97c2907c7d677bbcd62a615dff10e6c88b10c64ac8ab3b170d336fe61638

                                                    SHA512

                                                    2c5cd884bed43f240a25adbd35a0c5b51b4052b32e92ebdce68cbf7f5453a664158a9bc3458d0e35de879a315e9599ddb3d8aa04d9b3d69fbfa9f9c54476edf5

                                                  • C:\Users\Admin\AppData\Local\Temp\K8npeLxseK4m.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    3673b31c503ac812e137de7e8b19abdf

                                                    SHA1

                                                    a39704e05685d5e5f3999aeda453a62cb9d73d9a

                                                    SHA256

                                                    79153f419c8efafb1e8d34a9ac7805a58ee7af517d4b257a4b9fd3493f2d2191

                                                    SHA512

                                                    f12dee17e7fe8784572806a7204d1cf1f3b1d5389abf9a0721d69284104f4926ebac36e6f9b0948f23a8a30c73b19c13e91f131756c9daf1ca19350c64a07466

                                                  • C:\Users\Admin\AppData\Local\Temp\LkJjqHtrzX6a.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    6bc720b2389b420deebe99611afec661

                                                    SHA1

                                                    cdcdca9d8f6fc16b6b4dfd990bc186680c5e0f79

                                                    SHA256

                                                    22a83b0d5ee2808aec6567fb56a1f9c14d149c15f10a771bf37d6c7921573ca9

                                                    SHA512

                                                    696476942f5a723449516747cf09341a54333497516454a47d26e6a02610778b77f218d59095592f11a1add0e8ed06b20b7bd8635bae68758dd4fd34e2c5eb26

                                                  • C:\Users\Admin\AppData\Local\Temp\N6gPUuvUbhQb.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    eeda8b9121b3e18baa25fb89dccc49de

                                                    SHA1

                                                    93e2fc6368d0257bac1945fc355dd2282402ceec

                                                    SHA256

                                                    d563e967f0e7aac4b0c6e45d6baf31be6c92eaec99876daba7269e3202077150

                                                    SHA512

                                                    e031cf13448667d5334ffe71c8b87af4d66ae2f0b9d17ed33a2754fc03ed9fd17eecf1b6119a5b065bb58673fb625568c67475ea5aa449892b55b555bb578ef2

                                                  • C:\Users\Admin\AppData\Local\Temp\QQMVA0wCenmL.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    fbb92643a548bc7aa4e5a2390a6da9f0

                                                    SHA1

                                                    6eacffa05ab7e8f8d72c2457c4f22ed353bb1e32

                                                    SHA256

                                                    6c0e27a161002fd71fa88faf07486af023a01d72bc9d4469c495494fe6bda8b1

                                                    SHA512

                                                    d6026ffdf853dc87cde30e1e3b7dcaeb219bb0dd3d27c042e87877d8d0ced49057e70f6f1e6eafd20f86aeceb0041c3af5da4e2f7bc0c5ed2ea80845cf9c3acd

                                                  • C:\Users\Admin\AppData\Local\Temp\S^X.exe

                                                    Filesize

                                                    789KB

                                                    MD5

                                                    e2437ac017506bbde9a81fb1f618457b

                                                    SHA1

                                                    adef2615312b31e041ccf700b3982dd50b686c7f

                                                    SHA256

                                                    94594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12

                                                    SHA512

                                                    9169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019

                                                  • C:\Users\Admin\AppData\Local\Temp\bkoTd43Ab4B8.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    e2eeada74a20844044a41fed25035d42

                                                    SHA1

                                                    46bd41f26cb34737db5eb9230a871de02879648d

                                                    SHA256

                                                    07f25d067ca88b2df18dcf2abeab39c4f57d79c2faf2bd8a6270516b72ef7ae3

                                                    SHA512

                                                    7df96ca0326f72680894d829dbf5e539f3809d07b16ef833ced0b9a3af5bca8c39502b2299bd16e25136b103b31341967a78a12b93a926f10089e7c3b212c531

                                                  • C:\Users\Admin\AppData\Local\Temp\ehaiXIBCcCis.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    db2b9b5a5ba0b7535ff764d723e40dcb

                                                    SHA1

                                                    3eb1800addd908961459278a23296d6690d6db11

                                                    SHA256

                                                    abd128666922c233d47fde3ffa5b6ae8fe4b3226af8248aac89568f2e1c3d06d

                                                    SHA512

                                                    d1dc9eed660323b1d7a114fb3e2f43fa22b5a0272b1ebd265996b61950d8339090499630055f8273369b416aac10a243d79136727e6b89304c255bb5f9387cae

                                                  • C:\Users\Admin\AppData\Local\Temp\kLlJZ6RdlcPI.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    46743416795b175bf7020f85a0e5ec12

                                                    SHA1

                                                    1184c031d8e95583593e8d4ef99304976713f6af

                                                    SHA256

                                                    9ebcdbff07b4682cc01c435dae15151dbb7c6ba6047051300b36d0e36be0c3cf

                                                    SHA512

                                                    689ce271add7699946d5be967e1b0e20d507790bb4eb4cdf4b0c939d1e1d11e72f22bf7cec3ac3cd968b4acd93c0af044e426df3132f04138597273927e6beca

                                                  • C:\Users\Admin\AppData\Local\Temp\n7JTAzM7A4Zo.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    126fb490d8802fe6fe516186e361eb1f

                                                    SHA1

                                                    bac36955bf5649465dd79ac22441c9eea8ace9ca

                                                    SHA256

                                                    f9eb7b94aa7525b43dfa953bf3611932fcfc64e34fbcdf797e2e71956fd093d0

                                                    SHA512

                                                    ac46689ef6eaf787327f166fa00efd0c260961d940fc93d2bf02661d133fbd5b2546e4449fdbae975ba9d9b4ae12989e3f7dee8226456bd34c802b0fdfa366e9

                                                  • C:\Users\Admin\AppData\Local\Temp\tArOJ6zKy16q.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    0dcd894409868c4526de8c957941c069

                                                    SHA1

                                                    3a5d3614aff5b7ef351a1e853b72ac31293e10a0

                                                    SHA256

                                                    a6defd533332171c425d59451ae415e274c8374f226b8499ae41cfffaa980718

                                                    SHA512

                                                    3ad7acf252f42fba108ce5907f11aedc6619bb39ce1a7438289c0501c9c1d2666aa29d5767cc5b60a07430fd5c3b49aac5c860e715d8a59807c1319ef7ff067f

                                                  • C:\Users\Admin\AppData\Roaming\chrome.exe

                                                    Filesize

                                                    502KB

                                                    MD5

                                                    92479f1615fd4fa1dd3ac7f2e6a1b329

                                                    SHA1

                                                    0a6063d27c9f991be2053b113fcef25e071c57fd

                                                    SHA256

                                                    0c4917cc756e769e94ab97d626bef49713dab833525ba2e5d75fc9aea4c72569

                                                    SHA512

                                                    9f117c74c04749e6d0142e1cf952a8c59428f649413750921fc7aea35a3ccb62d9975ef954e61ce323d6234e0e9c7b8816f2ca9270552b726f9233219750847c

                                                  • memory/332-52-0x000000001B300000-0x000000001B350000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/332-53-0x000000001D0C0000-0x000000001D172000-memory.dmp

                                                    Filesize

                                                    712KB

                                                  • memory/1208-42-0x00000000719BE000-0x00000000719BF000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1208-46-0x0000000005290000-0x0000000005322000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/1208-45-0x0000000005990000-0x0000000005F34000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/1208-59-0x00000000053D0000-0x00000000053E0000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1208-60-0x00000000719BE000-0x00000000719BF000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1208-44-0x0000000000860000-0x000000000092C000-memory.dmp

                                                    Filesize

                                                    816KB

                                                  • memory/2448-43-0x000000001B480000-0x000000001B490000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/2448-40-0x00000000007A0000-0x0000000000824000-memory.dmp

                                                    Filesize

                                                    528KB

                                                  • memory/2448-34-0x00007FFF66363000-0x00007FFF66365000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/4760-39-0x0000000072DB0000-0x00000000733B8000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4760-41-0x0000000074E80000-0x0000000075431000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4760-0-0x0000000074E82000-0x0000000074E83000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4760-14-0x0000000073BA0000-0x0000000073BFB000-memory.dmp

                                                    Filesize

                                                    364KB

                                                  • memory/4760-13-0x0000000072DB0000-0x00000000733B8000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4760-12-0x0000000072DB0000-0x00000000733B8000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4760-11-0x0000000074E80000-0x0000000075431000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4760-10-0x0000000072DB0000-0x00000000733B8000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4760-2-0x0000000074E80000-0x0000000075431000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4760-1-0x0000000074E80000-0x0000000075431000-memory.dmp

                                                    Filesize

                                                    5.7MB