Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/01/2025, 05:33

General

  • Target

    JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe

  • Size

    6.0MB

  • MD5

    dc341a4899e1a077f128b79dbe296954

  • SHA1

    e1f1e167595b85784a78f2c3902a4e57082daff9

  • SHA256

    c846b98acb1e0423fa8b07228f06e3816cd0d5c8c076ff8c847622731aec5562

  • SHA512

    978acecbb0cc55a3e8ede7ef78572e3c09ae42553a01de3e82ac8a5f085a937a43f90f0acabf2cfa80e05b1a570c05c41191cc5f76b03492cdfc9c6a2445f949

  • SSDEEP

    196608:HS35uBog53HRVu7vHDpS1IqBRU7kCs2q:HS3YBr53xVu7vHhqBa4Cs

Malware Config

Extracted

Family

quasar

Version

1.4.0

Botnet

Chrome

C2

live.nodenet.ml:8863

Mutex

754ce6d6-f75b-4c6f-964c-3996e749369e

Attributes
  • encryption_key

    8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D

  • install_name

    chrome.exe

  • log_directory

    Logs

  • reconnect_delay

    3000

  • startup_key

    System

  • subdirectory

    chrome

Signatures

  • Quasar RAT

    Quasar is an open source Remote Access Tool.

  • Quasar family
  • Quasar payload 2 IoCs
  • Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Checks computer location settings 2 TTPs 16 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 17 IoCs
  • Loads dropped DLL 1 IoCs
  • Themida packer 5 IoCs

    Detects Themida, an advanced Windows software protection system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs

    Adversaries may check for Internet connectivity on compromised systems.

  • Runs ping.exe 1 TTPs 15 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe"
    1⤵
    • Identifies VirtualBox via ACPI registry values (likely anti-VM)
    • Checks BIOS information in registry
    • Checks computer location settings
    • Loads dropped DLL
    • Checks whether UAC is enabled
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:4596
    • C:\Users\Admin\AppData\Roaming\chrome.exe
      "C:\Users\Admin\AppData\Roaming\chrome.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:780
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome.exe" /rl HIGHEST /f
        3⤵
        • Scheduled Task/Job: Scheduled Task
        PID:2692
      • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
        "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
        3⤵
        • Checks computer location settings
        • Executes dropped EXE
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4836
        • C:\Windows\SYSTEM32\schtasks.exe
          "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
          4⤵
          • Scheduled Task/Job: Scheduled Task
          PID:3160
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MQR4WBHyc0XH.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:2112
          • C:\Windows\system32\chcp.com
            chcp 65001
            5⤵
              PID:3320
            • C:\Windows\system32\PING.EXE
              ping -n 10 localhost
              5⤵
              • System Network Configuration Discovery: Internet Connection Discovery
              • Runs ping.exe
              PID:3196
            • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
              "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
              5⤵
              • Checks computer location settings
              • Executes dropped EXE
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:4196
              • C:\Windows\SYSTEM32\schtasks.exe
                "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                6⤵
                • Scheduled Task/Job: Scheduled Task
                PID:468
              • C:\Windows\system32\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0yWgT4NDF3QS.bat" "
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4904
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  7⤵
                    PID:3052
                  • C:\Windows\system32\PING.EXE
                    ping -n 10 localhost
                    7⤵
                    • System Network Configuration Discovery: Internet Connection Discovery
                    • Runs ping.exe
                    PID:2708
                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                    7⤵
                    • Checks computer location settings
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious use of WriteProcessMemory
                    PID:3016
                    • C:\Windows\SYSTEM32\schtasks.exe
                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                      8⤵
                      • Scheduled Task/Job: Scheduled Task
                      PID:3064
                    • C:\Windows\system32\cmd.exe
                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tN0KUOSeOwmt.bat" "
                      8⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2484
                      • C:\Windows\system32\chcp.com
                        chcp 65001
                        9⤵
                          PID:3408
                        • C:\Windows\system32\PING.EXE
                          ping -n 10 localhost
                          9⤵
                          • System Network Configuration Discovery: Internet Connection Discovery
                          • Runs ping.exe
                          PID:4636
                        • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                          "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                          9⤵
                          • Checks computer location settings
                          • Executes dropped EXE
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:2124
                          • C:\Windows\SYSTEM32\schtasks.exe
                            "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                            10⤵
                            • Scheduled Task/Job: Scheduled Task
                            PID:3160
                          • C:\Windows\system32\cmd.exe
                            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\i40aDUH66iKL.bat" "
                            10⤵
                            • Suspicious use of WriteProcessMemory
                            PID:4644
                            • C:\Windows\system32\chcp.com
                              chcp 65001
                              11⤵
                                PID:1816
                              • C:\Windows\system32\PING.EXE
                                ping -n 10 localhost
                                11⤵
                                • System Network Configuration Discovery: Internet Connection Discovery
                                • Runs ping.exe
                                PID:5080
                              • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                11⤵
                                • Checks computer location settings
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:4400
                                • C:\Windows\SYSTEM32\schtasks.exe
                                  "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                  12⤵
                                  • Scheduled Task/Job: Scheduled Task
                                  PID:3104
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J0b3s9Z7HI9I.bat" "
                                  12⤵
                                  • Suspicious use of WriteProcessMemory
                                  PID:1120
                                  • C:\Windows\system32\chcp.com
                                    chcp 65001
                                    13⤵
                                      PID:4512
                                    • C:\Windows\system32\PING.EXE
                                      ping -n 10 localhost
                                      13⤵
                                      • System Network Configuration Discovery: Internet Connection Discovery
                                      • Runs ping.exe
                                      PID:3984
                                    • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                      "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                      13⤵
                                      • Checks computer location settings
                                      • Executes dropped EXE
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1148
                                      • C:\Windows\SYSTEM32\schtasks.exe
                                        "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                        14⤵
                                        • Scheduled Task/Job: Scheduled Task
                                        PID:3344
                                      • C:\Windows\system32\cmd.exe
                                        C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HLfFJv4jJcA6.bat" "
                                        14⤵
                                        • Suspicious use of WriteProcessMemory
                                        PID:4356
                                        • C:\Windows\system32\chcp.com
                                          chcp 65001
                                          15⤵
                                            PID:3432
                                          • C:\Windows\system32\PING.EXE
                                            ping -n 10 localhost
                                            15⤵
                                            • System Network Configuration Discovery: Internet Connection Discovery
                                            • Runs ping.exe
                                            PID:2072
                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                            15⤵
                                            • Checks computer location settings
                                            • Executes dropped EXE
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:4436
                                            • C:\Windows\SYSTEM32\schtasks.exe
                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                              16⤵
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:4556
                                            • C:\Windows\system32\cmd.exe
                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jk1Wx3e5G4dX.bat" "
                                              16⤵
                                                PID:4260
                                                • C:\Windows\system32\chcp.com
                                                  chcp 65001
                                                  17⤵
                                                    PID:2460
                                                  • C:\Windows\system32\PING.EXE
                                                    ping -n 10 localhost
                                                    17⤵
                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                    • Runs ping.exe
                                                    PID:4996
                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                    17⤵
                                                    • Checks computer location settings
                                                    • Executes dropped EXE
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:1556
                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                      18⤵
                                                      • Scheduled Task/Job: Scheduled Task
                                                      PID:1288
                                                    • C:\Windows\system32\cmd.exe
                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S6Bq3E2aMcBs.bat" "
                                                      18⤵
                                                        PID:1620
                                                        • C:\Windows\system32\chcp.com
                                                          chcp 65001
                                                          19⤵
                                                            PID:672
                                                          • C:\Windows\system32\PING.EXE
                                                            ping -n 10 localhost
                                                            19⤵
                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                            • Runs ping.exe
                                                            PID:3212
                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                            19⤵
                                                            • Checks computer location settings
                                                            • Executes dropped EXE
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:1224
                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                              20⤵
                                                              • Scheduled Task/Job: Scheduled Task
                                                              PID:3492
                                                            • C:\Windows\system32\cmd.exe
                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mVLoAA55Emnr.bat" "
                                                              20⤵
                                                                PID:2252
                                                                • C:\Windows\system32\chcp.com
                                                                  chcp 65001
                                                                  21⤵
                                                                    PID:5080
                                                                  • C:\Windows\system32\PING.EXE
                                                                    ping -n 10 localhost
                                                                    21⤵
                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                    • Runs ping.exe
                                                                    PID:4688
                                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                    21⤵
                                                                    • Checks computer location settings
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:4872
                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                      22⤵
                                                                      • Scheduled Task/Job: Scheduled Task
                                                                      PID:3196
                                                                    • C:\Windows\system32\cmd.exe
                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iiI925zhJI4t.bat" "
                                                                      22⤵
                                                                        PID:3468
                                                                        • C:\Windows\system32\chcp.com
                                                                          chcp 65001
                                                                          23⤵
                                                                            PID:4848
                                                                          • C:\Windows\system32\PING.EXE
                                                                            ping -n 10 localhost
                                                                            23⤵
                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                            • Runs ping.exe
                                                                            PID:1724
                                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                            23⤵
                                                                            • Checks computer location settings
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:1304
                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                              24⤵
                                                                              • Scheduled Task/Job: Scheduled Task
                                                                              PID:4696
                                                                            • C:\Windows\system32\cmd.exe
                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I1cIot23c9Pk.bat" "
                                                                              24⤵
                                                                                PID:1824
                                                                                • C:\Windows\system32\chcp.com
                                                                                  chcp 65001
                                                                                  25⤵
                                                                                    PID:3556
                                                                                  • C:\Windows\system32\PING.EXE
                                                                                    ping -n 10 localhost
                                                                                    25⤵
                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                    • Runs ping.exe
                                                                                    PID:4372
                                                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                    25⤵
                                                                                    • Checks computer location settings
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:1524
                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                      26⤵
                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                      PID:4592
                                                                                    • C:\Windows\system32\cmd.exe
                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9i9qiLQcLGND.bat" "
                                                                                      26⤵
                                                                                        PID:1280
                                                                                        • C:\Windows\system32\chcp.com
                                                                                          chcp 65001
                                                                                          27⤵
                                                                                            PID:2164
                                                                                          • C:\Windows\system32\PING.EXE
                                                                                            ping -n 10 localhost
                                                                                            27⤵
                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                            • Runs ping.exe
                                                                                            PID:4780
                                                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                            27⤵
                                                                                            • Checks computer location settings
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:1960
                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                              28⤵
                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                              PID:1684
                                                                                            • C:\Windows\system32\cmd.exe
                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D1vQWTQfUg8x.bat" "
                                                                                              28⤵
                                                                                                PID:1312
                                                                                                • C:\Windows\system32\chcp.com
                                                                                                  chcp 65001
                                                                                                  29⤵
                                                                                                    PID:1556
                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                    ping -n 10 localhost
                                                                                                    29⤵
                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                    • Runs ping.exe
                                                                                                    PID:2120
                                                                                                  • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                    "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                    29⤵
                                                                                                    • Checks computer location settings
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                                    PID:1432
                                                                                                    • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                      "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                      30⤵
                                                                                                      • Scheduled Task/Job: Scheduled Task
                                                                                                      PID:1520
                                                                                                    • C:\Windows\system32\cmd.exe
                                                                                                      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QmCoTm7DEJGj.bat" "
                                                                                                      30⤵
                                                                                                        PID:2628
                                                                                                        • C:\Windows\system32\chcp.com
                                                                                                          chcp 65001
                                                                                                          31⤵
                                                                                                            PID:2524
                                                                                                          • C:\Windows\system32\PING.EXE
                                                                                                            ping -n 10 localhost
                                                                                                            31⤵
                                                                                                            • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                            • Runs ping.exe
                                                                                                            PID:3908
                                                                                                          • C:\Users\Admin\AppData\Roaming\chrome\chrome.exe
                                                                                                            "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"
                                                                                                            31⤵
                                                                                                            • Checks computer location settings
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                                            PID:780
                                                                                                            • C:\Windows\SYSTEM32\schtasks.exe
                                                                                                              "schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f
                                                                                                              32⤵
                                                                                                              • Scheduled Task/Job: Scheduled Task
                                                                                                              PID:4688
                                                                                                            • C:\Windows\system32\cmd.exe
                                                                                                              C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LX4L7NUYnKys.bat" "
                                                                                                              32⤵
                                                                                                                PID:1264
                                                                                                                • C:\Windows\system32\chcp.com
                                                                                                                  chcp 65001
                                                                                                                  33⤵
                                                                                                                    PID:4940
                                                                                                                  • C:\Windows\system32\PING.EXE
                                                                                                                    ping -n 10 localhost
                                                                                                                    33⤵
                                                                                                                    • System Network Configuration Discovery: Internet Connection Discovery
                                                                                                                    • Runs ping.exe
                                                                                                                    PID:3984
                                                    • C:\Users\Admin\AppData\Local\Temp\S^X.exe
                                                      "C:\Users\Admin\AppData\Local\Temp\S^X.exe"
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of AdjustPrivilegeToken
                                                      PID:1052

                                                  Network

                                                  MITRE ATT&CK Enterprise v15

                                                  Replay Monitor

                                                  Loading Replay Monitor...

                                                  Downloads

                                                  • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\chrome.exe.log

                                                    Filesize

                                                    1KB

                                                    MD5

                                                    baf55b95da4a601229647f25dad12878

                                                    SHA1

                                                    abc16954ebfd213733c4493fc1910164d825cac8

                                                    SHA256

                                                    ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924

                                                    SHA512

                                                    24f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545

                                                  • C:\Users\Admin\AppData\Local\Temp\0yWgT4NDF3QS.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    8810ce68013b8097599f324b45247ae1

                                                    SHA1

                                                    83d9130742db041353ea95fe19006c9ec8ab160a

                                                    SHA256

                                                    d239557b397bbb3d6675f2bf7f1bc07d12c9f542cadbb840e86a859ef82e1832

                                                    SHA512

                                                    c1607475b4835db12fdb91989233c0b37530cc1ee11a6752830268cdacdd50da503f57a0597d12663276a2e58c81d0046528314f3685eb03a26030321232cdaa

                                                  • C:\Users\Admin\AppData\Local\Temp\9i9qiLQcLGND.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    fcb1022fa39c00c74ec06e3a229b71f6

                                                    SHA1

                                                    26dd4258bd218f83129a31984a160369a33d502c

                                                    SHA256

                                                    4d5d2107fc3ddd3b00bba6dcd1142763a80d32e756c0c4c1d20dd944ed833cd7

                                                    SHA512

                                                    9b80570724ac56bbebabba22805e426334bd239f9f431c3ebddf06448ea4d58fd3d6e6ada9f315d04a520895e5f53bd3d262828023848ecd22f771bc2438221b

                                                  • C:\Users\Admin\AppData\Local\Temp\D1vQWTQfUg8x.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    c94be5bd8b805179045f9692adc64299

                                                    SHA1

                                                    301406481b31ab9da8b9674a2ab258a384a1aa3e

                                                    SHA256

                                                    f78659ebf04afe5801699aefdd9e84c38f545a51cd1e4d97557ef1c877e36ede

                                                    SHA512

                                                    ca1a99a505592b311525262525f3ac2ebfa6df1bbb2c37e692f2304df3cfc6afe8b78659f0f0425597b707257a05c2512f9d7f589b3411ad5a48efc31b6a3f8e

                                                  • C:\Users\Admin\AppData\Local\Temp\HLfFJv4jJcA6.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    c5e120b4fd91159b5b439866f578c029

                                                    SHA1

                                                    0bc85d71742d0f3a7f8d02725f3d76d12529f3f7

                                                    SHA256

                                                    40a33fa6fad42509ff472d048d2e28489ef0c930aacecb559810942b6f323168

                                                    SHA512

                                                    ddf157884d4b9c12374b3c2b71a8ab031bc0bf625507466dc0f1fe50a0539384c98b4439f0d971d9b49db9b8b08e20dba588a18f00c3ec8c431ad05a740a8371

                                                  • C:\Users\Admin\AppData\Local\Temp\I1cIot23c9Pk.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    1901c8a68650b618b3766565264a0e5f

                                                    SHA1

                                                    57a68010e28a38b34f5162b35a75eba6472f9447

                                                    SHA256

                                                    bdd13eec3453c079fd67549e914ff1060be78c1c01a72c95aa6dce9a9490f160

                                                    SHA512

                                                    d75f8a386e070dfcc557ae8e36b21b14d9d57b46e8cc488ada6a0e99c9fe9600f94ecf758930d144503a49e48792d6598f2760e927ca1da24c3c45f9c720aebd

                                                  • C:\Users\Admin\AppData\Local\Temp\J0b3s9Z7HI9I.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    521080168c397ff3405c54c0c8561fbd

                                                    SHA1

                                                    5302fd790f3f1ef1ae08fce36339cc80307ed0d7

                                                    SHA256

                                                    859b73209e5da09fb90630f6d38e30c22a8dbc9715724f58288204b480de521c

                                                    SHA512

                                                    983f78db6c5c454b3ba599c001a46a8a0acbf8fdb5c2b55397419caf0c8269a5a754f75600c8182bed49bb7777fc03c0db8dfde564109cf64ae6490127e6243e

                                                  • C:\Users\Admin\AppData\Local\Temp\Jk1Wx3e5G4dX.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    db8c5c817b302cbaa911e79dff9cf8c5

                                                    SHA1

                                                    179db53fa1724b99a73752f90362d8bc733ae263

                                                    SHA256

                                                    0858ed96a6399b83e956c4e28081e08d47d0b54a5f4269375d9599e2bbc98762

                                                    SHA512

                                                    9d041385a13fda7b8b7d9d9fbb4084d68db4fbdbb80664c858724c9b180b493c01e1fbe2e40f75cdfb045bf3db90fac0aae1d60cf25967d8def6069454d60b10

                                                  • C:\Users\Admin\AppData\Local\Temp\LX4L7NUYnKys.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    ca7400c396799ffb38cfe7d0fcba093f

                                                    SHA1

                                                    33c075caaa3706729834b00c340fc0caefbf1671

                                                    SHA256

                                                    df7cbc6224a5f1002b66e694f0980c678f794298b43404e81c49ade54bff4dbe

                                                    SHA512

                                                    73bcfb2d6a7fa8e01bc2b877be35cb11944f8aefe1915784cc6c26180000dc5ce7b2cbd877e3210d8315c8fd7c0de1bfcb84ca87f80c708e690a2defd8df9e38

                                                  • C:\Users\Admin\AppData\Local\Temp\MQR4WBHyc0XH.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    542db90c86bc733173e45916e4e381e0

                                                    SHA1

                                                    6d22008b7abd04c4130cff4bbe3f1389c9abf50e

                                                    SHA256

                                                    fe9ff764c589b87276f3838243a1113fd9ff441469d53e9a4b8023324b813ca1

                                                    SHA512

                                                    f666861fd7894c5dcc93f523e745f1fe57b0df7e3c0b49c62a22b2be88f9ab4c1c97b6efaed83cdc8d8f134803951bc12c7af2312856d6dd74394054307a955b

                                                  • C:\Users\Admin\AppData\Local\Temp\QmCoTm7DEJGj.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    4657b43e96e3891d97de917cdd6a27ee

                                                    SHA1

                                                    1337fb7da284542a674b4a78452347dc8be66692

                                                    SHA256

                                                    b37c46b681e4acdb16ddc30266ad31da3ec0c023e9e31ec5c3ddf4dbbbc4a3ee

                                                    SHA512

                                                    8033ae448995cbc9b6b4a0b7b554a9319e2b3f0fc1de79d7d16f18c14ff5a2899b47fc88a3f2a1bba3df7c621835fc0c30de9a5e67f10720d8be950a276cec07

                                                  • C:\Users\Admin\AppData\Local\Temp\S6Bq3E2aMcBs.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    71c04720e4814303ad6537d134c7b111

                                                    SHA1

                                                    de4a4b0a970549364526071694660ed1f41ce702

                                                    SHA256

                                                    be2f7afd9b02e5645eed9f8f89665069d4ce9557509800a9ac96186b4de0d05e

                                                    SHA512

                                                    30053002ba9e271bdd7d12bb85c7df34aa7282e36aea0d397f2e9fd00b40837b7f8c34a3d947774954292ff80c893e184545b163085ca104655a99c952bf87a9

                                                  • C:\Users\Admin\AppData\Local\Temp\S^X.exe

                                                    Filesize

                                                    789KB

                                                    MD5

                                                    e2437ac017506bbde9a81fb1f618457b

                                                    SHA1

                                                    adef2615312b31e041ccf700b3982dd50b686c7f

                                                    SHA256

                                                    94594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12

                                                    SHA512

                                                    9169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019

                                                  • C:\Users\Admin\AppData\Local\Temp\f5e62d65-5f6c-40b2-b1cb-74dc607f952a\AgileDotNetRT.dll

                                                    Filesize

                                                    2.2MB

                                                    MD5

                                                    2d86c4ad18524003d56c1cb27c549ba8

                                                    SHA1

                                                    123007f9337364e044b87deacf6793c2027c8f47

                                                    SHA256

                                                    091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280

                                                    SHA512

                                                    0dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c

                                                  • C:\Users\Admin\AppData\Local\Temp\i40aDUH66iKL.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    a25c8a128e08163b90e026393f6ca260

                                                    SHA1

                                                    ecac0cc7b42fd101cefa04824fb21c4c0b5b0fd4

                                                    SHA256

                                                    129bcd68b1fdba3b0cd4495f57e20d1aa2f2d5f431a846f6c875406fa1face7f

                                                    SHA512

                                                    ca0134bc235ddd0d655ee22db5c662623fe4f4746d537d4e67a63d8315a6076109dc75d123e05817a2e8a30aea66a8333edc54f08bcbe4b46bd2234edd6d3a2b

                                                  • C:\Users\Admin\AppData\Local\Temp\iiI925zhJI4t.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    d48f335aff5e9a054d24c5d59fbabb55

                                                    SHA1

                                                    39e728a54b3a25f44179a7777bcae4539cb2a003

                                                    SHA256

                                                    52dd18a5a18ac84476ae5ac68e25697133fa71483b573dddeb18f422a4f80633

                                                    SHA512

                                                    95e5b410fc6676019468eef7a48c45a7297a3c463e7580551c6fbe65570cb714bf65c0535f696356b1fe8a5999b52b260d8582fcaca8947649a90d3944d8abb8

                                                  • C:\Users\Admin\AppData\Local\Temp\mVLoAA55Emnr.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    9b83806c78843b4dacb4d88c39e026da

                                                    SHA1

                                                    717f4f36dea3463123ba19096fbb1a43a1178954

                                                    SHA256

                                                    93e33a9051f5d65789a472fdc475170ee2cd499ed2e10eb6889ee3a5de1c32b0

                                                    SHA512

                                                    fe1f3a214f5dbc8bacacc09e287fe69d0cf830b1bcc5cafcc29cf5fc21c073bfc3b2c8b8ff25021559a12d2cce7b3b01284e558d57cee67a1f402e4c2ab6ba9c

                                                  • C:\Users\Admin\AppData\Local\Temp\tN0KUOSeOwmt.bat

                                                    Filesize

                                                    207B

                                                    MD5

                                                    3a4ecadc4515ae75c8b05de0a2b2e943

                                                    SHA1

                                                    8c112230fe829bac1a15ea388bf7edf43fff1a32

                                                    SHA256

                                                    f1161713b6ad3b0118ddbae2fce06ee961d7e28e3f70433636430ae6eee9c87f

                                                    SHA512

                                                    0fa83c90b249b26ea0b948e99526e056bac08cbb97074679633f6026169e42aa541e902c49205351a596148f342b5ab798e2f6f52c0ded57eebb8036b2076bc3

                                                  • C:\Users\Admin\AppData\Roaming\chrome.exe

                                                    Filesize

                                                    502KB

                                                    MD5

                                                    92479f1615fd4fa1dd3ac7f2e6a1b329

                                                    SHA1

                                                    0a6063d27c9f991be2053b113fcef25e071c57fd

                                                    SHA256

                                                    0c4917cc756e769e94ab97d626bef49713dab833525ba2e5d75fc9aea4c72569

                                                    SHA512

                                                    9f117c74c04749e6d0142e1cf952a8c59428f649413750921fc7aea35a3ccb62d9975ef954e61ce323d6234e0e9c7b8816f2ca9270552b726f9233219750847c

                                                  • memory/780-41-0x0000000000AE0000-0x0000000000B64000-memory.dmp

                                                    Filesize

                                                    528KB

                                                  • memory/780-43-0x000000001B8F0000-0x000000001B900000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/780-35-0x00007FFC6E593000-0x00007FFC6E595000-memory.dmp

                                                    Filesize

                                                    8KB

                                                  • memory/1052-60-0x0000000071D4E000-0x0000000071D4F000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1052-46-0x00000000053C0000-0x0000000005452000-memory.dmp

                                                    Filesize

                                                    584KB

                                                  • memory/1052-59-0x0000000005310000-0x0000000005320000-memory.dmp

                                                    Filesize

                                                    64KB

                                                  • memory/1052-42-0x0000000071D4E000-0x0000000071D4F000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/1052-44-0x0000000000980000-0x0000000000A4C000-memory.dmp

                                                    Filesize

                                                    816KB

                                                  • memory/1052-45-0x0000000005970000-0x0000000005F14000-memory.dmp

                                                    Filesize

                                                    5.6MB

                                                  • memory/4596-12-0x0000000075210000-0x00000000757C1000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4596-14-0x0000000073F30000-0x0000000073F8B000-memory.dmp

                                                    Filesize

                                                    364KB

                                                  • memory/4596-13-0x0000000073140000-0x0000000073748000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4596-11-0x0000000073140000-0x0000000073748000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4596-0-0x0000000075212000-0x0000000075213000-memory.dmp

                                                    Filesize

                                                    4KB

                                                  • memory/4596-39-0x0000000073140000-0x0000000073748000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4596-10-0x0000000073140000-0x0000000073748000-memory.dmp

                                                    Filesize

                                                    6.0MB

                                                  • memory/4596-40-0x0000000075210000-0x00000000757C1000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4596-2-0x0000000075210000-0x00000000757C1000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4596-1-0x0000000075210000-0x00000000757C1000-memory.dmp

                                                    Filesize

                                                    5.7MB

                                                  • memory/4836-52-0x0000000002C60000-0x0000000002CB0000-memory.dmp

                                                    Filesize

                                                    320KB

                                                  • memory/4836-53-0x000000001BD40000-0x000000001BDF2000-memory.dmp

                                                    Filesize

                                                    712KB