Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2025, 05:33
Behavioral task
behavioral1
Sample
JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe
-
Size
6.0MB
-
MD5
dc341a4899e1a077f128b79dbe296954
-
SHA1
e1f1e167595b85784a78f2c3902a4e57082daff9
-
SHA256
c846b98acb1e0423fa8b07228f06e3816cd0d5c8c076ff8c847622731aec5562
-
SHA512
978acecbb0cc55a3e8ede7ef78572e3c09ae42553a01de3e82ac8a5f085a937a43f90f0acabf2cfa80e05b1a570c05c41191cc5f76b03492cdfc9c6a2445f949
-
SSDEEP
196608:HS35uBog53HRVu7vHDpS1IqBRU7kCs2q:HS3YBr53xVu7vHhqBa4Cs
Malware Config
Extracted
quasar
1.4.0
Chrome
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
chrome.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
chrome
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x0008000000023c56-19.dat family_quasar behavioral2/memory/780-41-0x0000000000AE0000-0x0000000000B64000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe Key value queried \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\International\Geo\Nation chrome.exe -
Executes dropped EXE 17 IoCs
pid Process 780 chrome.exe 1052 S^X.exe 4836 chrome.exe 4196 chrome.exe 3016 chrome.exe 2124 chrome.exe 4400 chrome.exe 1148 chrome.exe 4436 chrome.exe 1556 chrome.exe 1224 chrome.exe 4872 chrome.exe 1304 chrome.exe 1524 chrome.exe 1960 chrome.exe 1432 chrome.exe 780 chrome.exe -
Loads dropped DLL 1 IoCs
pid Process 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe -
resource yara_rule behavioral2/files/0x0007000000023c59-6.dat themida behavioral2/memory/4596-10-0x0000000073140000-0x0000000073748000-memory.dmp themida behavioral2/memory/4596-11-0x0000000073140000-0x0000000073748000-memory.dmp themida behavioral2/memory/4596-13-0x0000000073140000-0x0000000073748000-memory.dmp themida behavioral2/memory/4596-39-0x0000000073140000-0x0000000073748000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S^X.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4688 PING.EXE 1724 PING.EXE 3908 PING.EXE 2708 PING.EXE 2072 PING.EXE 3212 PING.EXE 4372 PING.EXE 3196 PING.EXE 4780 PING.EXE 2120 PING.EXE 3984 PING.EXE 4636 PING.EXE 5080 PING.EXE 3984 PING.EXE 4996 PING.EXE -
Runs ping.exe 1 TTPs 15 IoCs
pid Process 4372 PING.EXE 2120 PING.EXE 3984 PING.EXE 5080 PING.EXE 4996 PING.EXE 2072 PING.EXE 3212 PING.EXE 4780 PING.EXE 3196 PING.EXE 4636 PING.EXE 1724 PING.EXE 2708 PING.EXE 4688 PING.EXE 3984 PING.EXE 3908 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3344 schtasks.exe 3196 schtasks.exe 4688 schtasks.exe 468 schtasks.exe 3104 schtasks.exe 1288 schtasks.exe 4696 schtasks.exe 1684 schtasks.exe 3160 schtasks.exe 3064 schtasks.exe 3160 schtasks.exe 3492 schtasks.exe 2692 schtasks.exe 4556 schtasks.exe 4592 schtasks.exe 1520 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 17 IoCs
description pid Process Token: SeDebugPrivilege 780 chrome.exe Token: SeDebugPrivilege 4836 chrome.exe Token: SeDebugPrivilege 1052 S^X.exe Token: SeDebugPrivilege 4196 chrome.exe Token: SeDebugPrivilege 3016 chrome.exe Token: SeDebugPrivilege 2124 chrome.exe Token: SeDebugPrivilege 4400 chrome.exe Token: SeDebugPrivilege 1148 chrome.exe Token: SeDebugPrivilege 4436 chrome.exe Token: SeDebugPrivilege 1556 chrome.exe Token: SeDebugPrivilege 1224 chrome.exe Token: SeDebugPrivilege 4872 chrome.exe Token: SeDebugPrivilege 1304 chrome.exe Token: SeDebugPrivilege 1524 chrome.exe Token: SeDebugPrivilege 1960 chrome.exe Token: SeDebugPrivilege 1432 chrome.exe Token: SeDebugPrivilege 780 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4596 wrote to memory of 780 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe 83 PID 4596 wrote to memory of 780 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe 83 PID 4596 wrote to memory of 1052 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe 84 PID 4596 wrote to memory of 1052 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe 84 PID 4596 wrote to memory of 1052 4596 JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe 84 PID 780 wrote to memory of 2692 780 chrome.exe 85 PID 780 wrote to memory of 2692 780 chrome.exe 85 PID 780 wrote to memory of 4836 780 chrome.exe 87 PID 780 wrote to memory of 4836 780 chrome.exe 87 PID 4836 wrote to memory of 3160 4836 chrome.exe 88 PID 4836 wrote to memory of 3160 4836 chrome.exe 88 PID 4836 wrote to memory of 2112 4836 chrome.exe 90 PID 4836 wrote to memory of 2112 4836 chrome.exe 90 PID 2112 wrote to memory of 3320 2112 cmd.exe 92 PID 2112 wrote to memory of 3320 2112 cmd.exe 92 PID 2112 wrote to memory of 3196 2112 cmd.exe 93 PID 2112 wrote to memory of 3196 2112 cmd.exe 93 PID 2112 wrote to memory of 4196 2112 cmd.exe 104 PID 2112 wrote to memory of 4196 2112 cmd.exe 104 PID 4196 wrote to memory of 468 4196 chrome.exe 105 PID 4196 wrote to memory of 468 4196 chrome.exe 105 PID 4196 wrote to memory of 4904 4196 chrome.exe 108 PID 4196 wrote to memory of 4904 4196 chrome.exe 108 PID 4904 wrote to memory of 3052 4904 cmd.exe 110 PID 4904 wrote to memory of 3052 4904 cmd.exe 110 PID 4904 wrote to memory of 2708 4904 cmd.exe 111 PID 4904 wrote to memory of 2708 4904 cmd.exe 111 PID 4904 wrote to memory of 3016 4904 cmd.exe 117 PID 4904 wrote to memory of 3016 4904 cmd.exe 117 PID 3016 wrote to memory of 3064 3016 chrome.exe 118 PID 3016 wrote to memory of 3064 3016 chrome.exe 118 PID 3016 wrote to memory of 2484 3016 chrome.exe 121 PID 3016 wrote to memory of 2484 3016 chrome.exe 121 PID 2484 wrote to memory of 3408 2484 cmd.exe 123 PID 2484 wrote to memory of 3408 2484 cmd.exe 123 PID 2484 wrote to memory of 4636 2484 cmd.exe 124 PID 2484 wrote to memory of 4636 2484 cmd.exe 124 PID 2484 wrote to memory of 2124 2484 cmd.exe 129 PID 2484 wrote to memory of 2124 2484 cmd.exe 129 PID 2124 wrote to memory of 3160 2124 chrome.exe 130 PID 2124 wrote to memory of 3160 2124 chrome.exe 130 PID 2124 wrote to memory of 4644 2124 chrome.exe 133 PID 2124 wrote to memory of 4644 2124 chrome.exe 133 PID 4644 wrote to memory of 1816 4644 cmd.exe 135 PID 4644 wrote to memory of 1816 4644 cmd.exe 135 PID 4644 wrote to memory of 5080 4644 cmd.exe 136 PID 4644 wrote to memory of 5080 4644 cmd.exe 136 PID 4644 wrote to memory of 4400 4644 cmd.exe 138 PID 4644 wrote to memory of 4400 4644 cmd.exe 138 PID 4400 wrote to memory of 3104 4400 chrome.exe 139 PID 4400 wrote to memory of 3104 4400 chrome.exe 139 PID 4400 wrote to memory of 1120 4400 chrome.exe 141 PID 4400 wrote to memory of 1120 4400 chrome.exe 141 PID 1120 wrote to memory of 4512 1120 cmd.exe 144 PID 1120 wrote to memory of 4512 1120 cmd.exe 144 PID 1120 wrote to memory of 3984 1120 cmd.exe 145 PID 1120 wrote to memory of 3984 1120 cmd.exe 145 PID 1120 wrote to memory of 1148 1120 cmd.exe 147 PID 1120 wrote to memory of 1148 1120 cmd.exe 147 PID 1148 wrote to memory of 3344 1148 chrome.exe 148 PID 1148 wrote to memory of 3344 1148 chrome.exe 148 PID 1148 wrote to memory of 4356 1148 chrome.exe 151 PID 1148 wrote to memory of 4356 1148 chrome.exe 151 PID 4356 wrote to memory of 3432 4356 cmd.exe 153 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_dc341a4899e1a077f128b79dbe296954.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4596 -
C:\Users\Admin\AppData\Roaming\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:780 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:2692
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\MQR4WBHyc0XH.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:3320
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3196
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:468
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\0yWgT4NDF3QS.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:3052
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2708
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:3064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tN0KUOSeOwmt.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3408
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4636
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2124 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\i40aDUH66iKL.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:4644 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:1816
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5080
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:3104
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\J0b3s9Z7HI9I.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:4512
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3984
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:3344
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\HLfFJv4jJcA6.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\system32\chcp.comchcp 6500115⤵PID:3432
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2072
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:4556
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Jk1Wx3e5G4dX.bat" "16⤵PID:4260
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:2460
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4996
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f18⤵
- Scheduled Task/Job: Scheduled Task
PID:1288
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S6Bq3E2aMcBs.bat" "18⤵PID:1620
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:672
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3212
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1224 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:3492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\mVLoAA55Emnr.bat" "20⤵PID:2252
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:5080
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4688
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4872 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:3196
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\iiI925zhJI4t.bat" "22⤵PID:3468
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:4848
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1724
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1304 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f24⤵
- Scheduled Task/Job: Scheduled Task
PID:4696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\I1cIot23c9Pk.bat" "24⤵PID:1824
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:3556
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4372
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1524 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f26⤵
- Scheduled Task/Job: Scheduled Task
PID:4592
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\9i9qiLQcLGND.bat" "26⤵PID:1280
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:2164
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4780
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f28⤵
- Scheduled Task/Job: Scheduled Task
PID:1684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\D1vQWTQfUg8x.bat" "28⤵PID:1312
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:1556
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2120
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1432 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f30⤵
- Scheduled Task/Job: Scheduled Task
PID:1520
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\QmCoTm7DEJGj.bat" "30⤵PID:2628
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:2524
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3908
-
-
C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"C:\Users\Admin\AppData\Roaming\chrome\chrome.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:780 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\chrome\chrome.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:4688
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LX4L7NUYnKys.bat" "32⤵PID:1264
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:4940
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3984
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\S^X.exe"C:\Users\Admin\AppData\Local\Temp\S^X.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
207B
MD58810ce68013b8097599f324b45247ae1
SHA183d9130742db041353ea95fe19006c9ec8ab160a
SHA256d239557b397bbb3d6675f2bf7f1bc07d12c9f542cadbb840e86a859ef82e1832
SHA512c1607475b4835db12fdb91989233c0b37530cc1ee11a6752830268cdacdd50da503f57a0597d12663276a2e58c81d0046528314f3685eb03a26030321232cdaa
-
Filesize
207B
MD5fcb1022fa39c00c74ec06e3a229b71f6
SHA126dd4258bd218f83129a31984a160369a33d502c
SHA2564d5d2107fc3ddd3b00bba6dcd1142763a80d32e756c0c4c1d20dd944ed833cd7
SHA5129b80570724ac56bbebabba22805e426334bd239f9f431c3ebddf06448ea4d58fd3d6e6ada9f315d04a520895e5f53bd3d262828023848ecd22f771bc2438221b
-
Filesize
207B
MD5c94be5bd8b805179045f9692adc64299
SHA1301406481b31ab9da8b9674a2ab258a384a1aa3e
SHA256f78659ebf04afe5801699aefdd9e84c38f545a51cd1e4d97557ef1c877e36ede
SHA512ca1a99a505592b311525262525f3ac2ebfa6df1bbb2c37e692f2304df3cfc6afe8b78659f0f0425597b707257a05c2512f9d7f589b3411ad5a48efc31b6a3f8e
-
Filesize
207B
MD5c5e120b4fd91159b5b439866f578c029
SHA10bc85d71742d0f3a7f8d02725f3d76d12529f3f7
SHA25640a33fa6fad42509ff472d048d2e28489ef0c930aacecb559810942b6f323168
SHA512ddf157884d4b9c12374b3c2b71a8ab031bc0bf625507466dc0f1fe50a0539384c98b4439f0d971d9b49db9b8b08e20dba588a18f00c3ec8c431ad05a740a8371
-
Filesize
207B
MD51901c8a68650b618b3766565264a0e5f
SHA157a68010e28a38b34f5162b35a75eba6472f9447
SHA256bdd13eec3453c079fd67549e914ff1060be78c1c01a72c95aa6dce9a9490f160
SHA512d75f8a386e070dfcc557ae8e36b21b14d9d57b46e8cc488ada6a0e99c9fe9600f94ecf758930d144503a49e48792d6598f2760e927ca1da24c3c45f9c720aebd
-
Filesize
207B
MD5521080168c397ff3405c54c0c8561fbd
SHA15302fd790f3f1ef1ae08fce36339cc80307ed0d7
SHA256859b73209e5da09fb90630f6d38e30c22a8dbc9715724f58288204b480de521c
SHA512983f78db6c5c454b3ba599c001a46a8a0acbf8fdb5c2b55397419caf0c8269a5a754f75600c8182bed49bb7777fc03c0db8dfde564109cf64ae6490127e6243e
-
Filesize
207B
MD5db8c5c817b302cbaa911e79dff9cf8c5
SHA1179db53fa1724b99a73752f90362d8bc733ae263
SHA2560858ed96a6399b83e956c4e28081e08d47d0b54a5f4269375d9599e2bbc98762
SHA5129d041385a13fda7b8b7d9d9fbb4084d68db4fbdbb80664c858724c9b180b493c01e1fbe2e40f75cdfb045bf3db90fac0aae1d60cf25967d8def6069454d60b10
-
Filesize
207B
MD5ca7400c396799ffb38cfe7d0fcba093f
SHA133c075caaa3706729834b00c340fc0caefbf1671
SHA256df7cbc6224a5f1002b66e694f0980c678f794298b43404e81c49ade54bff4dbe
SHA51273bcfb2d6a7fa8e01bc2b877be35cb11944f8aefe1915784cc6c26180000dc5ce7b2cbd877e3210d8315c8fd7c0de1bfcb84ca87f80c708e690a2defd8df9e38
-
Filesize
207B
MD5542db90c86bc733173e45916e4e381e0
SHA16d22008b7abd04c4130cff4bbe3f1389c9abf50e
SHA256fe9ff764c589b87276f3838243a1113fd9ff441469d53e9a4b8023324b813ca1
SHA512f666861fd7894c5dcc93f523e745f1fe57b0df7e3c0b49c62a22b2be88f9ab4c1c97b6efaed83cdc8d8f134803951bc12c7af2312856d6dd74394054307a955b
-
Filesize
207B
MD54657b43e96e3891d97de917cdd6a27ee
SHA11337fb7da284542a674b4a78452347dc8be66692
SHA256b37c46b681e4acdb16ddc30266ad31da3ec0c023e9e31ec5c3ddf4dbbbc4a3ee
SHA5128033ae448995cbc9b6b4a0b7b554a9319e2b3f0fc1de79d7d16f18c14ff5a2899b47fc88a3f2a1bba3df7c621835fc0c30de9a5e67f10720d8be950a276cec07
-
Filesize
207B
MD571c04720e4814303ad6537d134c7b111
SHA1de4a4b0a970549364526071694660ed1f41ce702
SHA256be2f7afd9b02e5645eed9f8f89665069d4ce9557509800a9ac96186b4de0d05e
SHA51230053002ba9e271bdd7d12bb85c7df34aa7282e36aea0d397f2e9fd00b40837b7f8c34a3d947774954292ff80c893e184545b163085ca104655a99c952bf87a9
-
Filesize
789KB
MD5e2437ac017506bbde9a81fb1f618457b
SHA1adef2615312b31e041ccf700b3982dd50b686c7f
SHA25694594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12
SHA5129169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019
-
Filesize
2.2MB
MD52d86c4ad18524003d56c1cb27c549ba8
SHA1123007f9337364e044b87deacf6793c2027c8f47
SHA256091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280
SHA5120dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c
-
Filesize
207B
MD5a25c8a128e08163b90e026393f6ca260
SHA1ecac0cc7b42fd101cefa04824fb21c4c0b5b0fd4
SHA256129bcd68b1fdba3b0cd4495f57e20d1aa2f2d5f431a846f6c875406fa1face7f
SHA512ca0134bc235ddd0d655ee22db5c662623fe4f4746d537d4e67a63d8315a6076109dc75d123e05817a2e8a30aea66a8333edc54f08bcbe4b46bd2234edd6d3a2b
-
Filesize
207B
MD5d48f335aff5e9a054d24c5d59fbabb55
SHA139e728a54b3a25f44179a7777bcae4539cb2a003
SHA25652dd18a5a18ac84476ae5ac68e25697133fa71483b573dddeb18f422a4f80633
SHA51295e5b410fc6676019468eef7a48c45a7297a3c463e7580551c6fbe65570cb714bf65c0535f696356b1fe8a5999b52b260d8582fcaca8947649a90d3944d8abb8
-
Filesize
207B
MD59b83806c78843b4dacb4d88c39e026da
SHA1717f4f36dea3463123ba19096fbb1a43a1178954
SHA25693e33a9051f5d65789a472fdc475170ee2cd499ed2e10eb6889ee3a5de1c32b0
SHA512fe1f3a214f5dbc8bacacc09e287fe69d0cf830b1bcc5cafcc29cf5fc21c073bfc3b2c8b8ff25021559a12d2cce7b3b01284e558d57cee67a1f402e4c2ab6ba9c
-
Filesize
207B
MD53a4ecadc4515ae75c8b05de0a2b2e943
SHA18c112230fe829bac1a15ea388bf7edf43fff1a32
SHA256f1161713b6ad3b0118ddbae2fce06ee961d7e28e3f70433636430ae6eee9c87f
SHA5120fa83c90b249b26ea0b948e99526e056bac08cbb97074679633f6026169e42aa541e902c49205351a596148f342b5ab798e2f6f52c0ded57eebb8036b2076bc3
-
Filesize
502KB
MD592479f1615fd4fa1dd3ac7f2e6a1b329
SHA10a6063d27c9f991be2053b113fcef25e071c57fd
SHA2560c4917cc756e769e94ab97d626bef49713dab833525ba2e5d75fc9aea4c72569
SHA5129f117c74c04749e6d0142e1cf952a8c59428f649413750921fc7aea35a3ccb62d9975ef954e61ce323d6234e0e9c7b8816f2ca9270552b726f9233219750847c