Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/01/2025, 15:53
Behavioral task
behavioral1
Sample
JaffaCakes118_e82e07a2f06226989c2864557311d904.exe
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_e82e07a2f06226989c2864557311d904.exe
-
Size
6.3MB
-
MD5
e82e07a2f06226989c2864557311d904
-
SHA1
1b5efe272bcc5fd95f4cae034995fc3b795d3416
-
SHA256
2602948e0301d266cd808c4b9d8bbe75dee0025686b603b2c321d6e97c5f2cc5
-
SHA512
f43124a0f4cff06fb31450dece6d21394a1817b56d50b2988338b1295ea963b9bc9405d4691a926c7179ddb785d67e01f4bfb74044e8fcf2db0f361bbde3f62d
-
SSDEEP
98304:P3c+RXz2LmThcHp5ooEAnHRVN07KgHDpS18DqBRe7qxKfT1J+tNY3LU4rI2qoP:rRfg53HRVu7vHDpS1IqBRU7kCs2q
Malware Config
Extracted
quasar
1.4.0
Word
live.nodenet.ml:8863
754ce6d6-f75b-4c6f-964c-3996e749369e
-
encryption_key
8F8DE0B9E0A9CA156684061043456EC2CF7D0A6D
-
install_name
Word.exe
-
log_directory
Logs
-
reconnect_delay
3000
-
startup_key
System
-
subdirectory
WordW
Signatures
-
Quasar family
-
Quasar payload 2 IoCs
resource yara_rule behavioral2/files/0x000a000000023b67-19.dat family_quasar behavioral2/memory/4528-36-0x00000000009E0000-0x0000000000A64000-memory.dmp family_quasar -
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ JaffaCakes118_e82e07a2f06226989c2864557311d904.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion JaffaCakes118_e82e07a2f06226989c2864557311d904.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion JaffaCakes118_e82e07a2f06226989c2864557311d904.exe -
Checks computer location settings 2 TTPs 16 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation Word.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation JaffaCakes118_e82e07a2f06226989c2864557311d904.exe -
Executes dropped EXE 17 IoCs
pid Process 4528 Word.exe 860 S^X.exe 1936 Word.exe 3748 Word.exe 4240 Word.exe 1080 Word.exe 4288 Word.exe 2644 Word.exe 2428 Word.exe 3084 Word.exe 2760 Word.exe 916 Word.exe 4024 Word.exe 860 Word.exe 3456 Word.exe 3816 Word.exe 2956 Word.exe -
Loads dropped DLL 1 IoCs
pid Process 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe -
resource yara_rule behavioral2/files/0x000a000000023b66-6.dat themida behavioral2/memory/3128-10-0x00000000733F0000-0x00000000739F8000-memory.dmp themida behavioral2/memory/3128-11-0x00000000733F0000-0x00000000739F8000-memory.dmp themida behavioral2/memory/3128-13-0x00000000733F0000-0x00000000739F8000-memory.dmp themida behavioral2/memory/3128-40-0x00000000733F0000-0x00000000739F8000-memory.dmp themida -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_e82e07a2f06226989c2864557311d904.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 4592 860 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_e82e07a2f06226989c2864557311d904.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language S^X.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 15 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 764 PING.EXE 3756 PING.EXE 1016 PING.EXE 416 PING.EXE 1756 PING.EXE 2968 PING.EXE 1056 PING.EXE 1860 PING.EXE 3372 PING.EXE 920 PING.EXE 1904 PING.EXE 2580 PING.EXE 2600 PING.EXE 3692 PING.EXE 760 PING.EXE -
Runs ping.exe 1 TTPs 15 IoCs
pid Process 2968 PING.EXE 2580 PING.EXE 1016 PING.EXE 1860 PING.EXE 1904 PING.EXE 1756 PING.EXE 3756 PING.EXE 3692 PING.EXE 1056 PING.EXE 920 PING.EXE 416 PING.EXE 764 PING.EXE 3372 PING.EXE 2600 PING.EXE 760 PING.EXE -
Scheduled Task/Job: Scheduled Task 1 TTPs 16 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1956 schtasks.exe 4896 schtasks.exe 3780 schtasks.exe 1356 schtasks.exe 3484 schtasks.exe 5024 schtasks.exe 1420 schtasks.exe 1564 schtasks.exe 2232 schtasks.exe 4620 schtasks.exe 1492 schtasks.exe 5044 schtasks.exe 3540 schtasks.exe 1552 schtasks.exe 1280 schtasks.exe 764 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
description pid Process Token: SeDebugPrivilege 4528 Word.exe Token: SeDebugPrivilege 1936 Word.exe Token: SeDebugPrivilege 3748 Word.exe Token: SeDebugPrivilege 4240 Word.exe Token: SeDebugPrivilege 1080 Word.exe Token: SeDebugPrivilege 4288 Word.exe Token: SeDebugPrivilege 2644 Word.exe Token: SeDebugPrivilege 2428 Word.exe Token: SeDebugPrivilege 3084 Word.exe Token: SeDebugPrivilege 2760 Word.exe Token: SeDebugPrivilege 916 Word.exe Token: SeDebugPrivilege 4024 Word.exe Token: SeDebugPrivilege 860 Word.exe Token: SeDebugPrivilege 3456 Word.exe Token: SeDebugPrivilege 3816 Word.exe Token: SeDebugPrivilege 2956 Word.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3128 wrote to memory of 4528 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe 82 PID 3128 wrote to memory of 4528 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe 82 PID 3128 wrote to memory of 860 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe 83 PID 3128 wrote to memory of 860 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe 83 PID 3128 wrote to memory of 860 3128 JaffaCakes118_e82e07a2f06226989c2864557311d904.exe 83 PID 4528 wrote to memory of 1956 4528 Word.exe 84 PID 4528 wrote to memory of 1956 4528 Word.exe 84 PID 4528 wrote to memory of 1936 4528 Word.exe 86 PID 4528 wrote to memory of 1936 4528 Word.exe 86 PID 1936 wrote to memory of 2232 1936 Word.exe 87 PID 1936 wrote to memory of 2232 1936 Word.exe 87 PID 1936 wrote to memory of 1476 1936 Word.exe 89 PID 1936 wrote to memory of 1476 1936 Word.exe 89 PID 1476 wrote to memory of 4860 1476 cmd.exe 91 PID 1476 wrote to memory of 4860 1476 cmd.exe 91 PID 1476 wrote to memory of 1756 1476 cmd.exe 92 PID 1476 wrote to memory of 1756 1476 cmd.exe 92 PID 1476 wrote to memory of 3748 1476 cmd.exe 101 PID 1476 wrote to memory of 3748 1476 cmd.exe 101 PID 3748 wrote to memory of 4620 3748 Word.exe 102 PID 3748 wrote to memory of 4620 3748 Word.exe 102 PID 3748 wrote to memory of 3368 3748 Word.exe 104 PID 3748 wrote to memory of 3368 3748 Word.exe 104 PID 3368 wrote to memory of 1932 3368 cmd.exe 106 PID 3368 wrote to memory of 1932 3368 cmd.exe 106 PID 3368 wrote to memory of 764 3368 cmd.exe 107 PID 3368 wrote to memory of 764 3368 cmd.exe 107 PID 3368 wrote to memory of 4240 3368 cmd.exe 110 PID 3368 wrote to memory of 4240 3368 cmd.exe 110 PID 4240 wrote to memory of 4896 4240 Word.exe 111 PID 4240 wrote to memory of 4896 4240 Word.exe 111 PID 4240 wrote to memory of 1148 4240 Word.exe 113 PID 4240 wrote to memory of 1148 4240 Word.exe 113 PID 1148 wrote to memory of 3532 1148 cmd.exe 115 PID 1148 wrote to memory of 3532 1148 cmd.exe 115 PID 1148 wrote to memory of 2968 1148 cmd.exe 116 PID 1148 wrote to memory of 2968 1148 cmd.exe 116 PID 1148 wrote to memory of 1080 1148 cmd.exe 118 PID 1148 wrote to memory of 1080 1148 cmd.exe 118 PID 1080 wrote to memory of 3780 1080 Word.exe 119 PID 1080 wrote to memory of 3780 1080 Word.exe 119 PID 1080 wrote to memory of 1092 1080 Word.exe 121 PID 1080 wrote to memory of 1092 1080 Word.exe 121 PID 1092 wrote to memory of 4836 1092 cmd.exe 123 PID 1092 wrote to memory of 4836 1092 cmd.exe 123 PID 1092 wrote to memory of 3756 1092 cmd.exe 124 PID 1092 wrote to memory of 3756 1092 cmd.exe 124 PID 1092 wrote to memory of 4288 1092 cmd.exe 125 PID 1092 wrote to memory of 4288 1092 cmd.exe 125 PID 4288 wrote to memory of 1492 4288 Word.exe 126 PID 4288 wrote to memory of 1492 4288 Word.exe 126 PID 4288 wrote to memory of 1352 4288 Word.exe 128 PID 4288 wrote to memory of 1352 4288 Word.exe 128 PID 1352 wrote to memory of 2148 1352 cmd.exe 130 PID 1352 wrote to memory of 2148 1352 cmd.exe 130 PID 1352 wrote to memory of 3372 1352 cmd.exe 131 PID 1352 wrote to memory of 3372 1352 cmd.exe 131 PID 1352 wrote to memory of 2644 1352 cmd.exe 133 PID 1352 wrote to memory of 2644 1352 cmd.exe 133 PID 2644 wrote to memory of 1356 2644 Word.exe 134 PID 2644 wrote to memory of 1356 2644 Word.exe 134 PID 2644 wrote to memory of 2912 2644 Word.exe 136 PID 2644 wrote to memory of 2912 2644 Word.exe 136 PID 2912 wrote to memory of 4688 2912 cmd.exe 138 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e82e07a2f06226989c2864557311d904.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_e82e07a2f06226989c2864557311d904.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Users\Admin\AppData\Roaming\Word.exe"C:\Users\Admin\AppData\Roaming\Word.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\Word.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:1956
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f4⤵
- Scheduled Task/Job: Scheduled Task
PID:2232
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\fhWc7llsW0nK.bat" "4⤵
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\system32\chcp.comchcp 650015⤵PID:4860
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1756
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3748 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f6⤵
- Scheduled Task/Job: Scheduled Task
PID:4620
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\OPQH7aAtN46n.bat" "6⤵
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\system32\chcp.comchcp 650017⤵PID:1932
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost7⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:764
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f8⤵
- Scheduled Task/Job: Scheduled Task
PID:4896
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\LpqwgPdW92Bo.bat" "8⤵
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\system32\chcp.comchcp 650019⤵PID:3532
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost9⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2968
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f10⤵
- Scheduled Task/Job: Scheduled Task
PID:3780
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\S0Ymgmukj4XW.bat" "10⤵
- Suspicious use of WriteProcessMemory
PID:1092 -
C:\Windows\system32\chcp.comchcp 6500111⤵PID:4836
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost11⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3756
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4288 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f12⤵
- Scheduled Task/Job: Scheduled Task
PID:1492
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\X7wtWsCB7Cz0.bat" "12⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\system32\chcp.comchcp 6500113⤵PID:2148
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost13⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3372
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f14⤵
- Scheduled Task/Job: Scheduled Task
PID:1356
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\3xYSpafNuJxw.bat" "14⤵
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\system32\chcp.comchcp 6500115⤵PID:4688
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost15⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2580
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2428 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f16⤵
- Scheduled Task/Job: Scheduled Task
PID:3540
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\uMtuuiGxbq8J.bat" "16⤵PID:3748
-
C:\Windows\system32\chcp.comchcp 6500117⤵PID:1636
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost17⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2600
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3084 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f18⤵
- Scheduled Task/Job: Scheduled Task
PID:5044
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\wve58d783M96.bat" "18⤵PID:4192
-
C:\Windows\system32\chcp.comchcp 6500119⤵PID:3600
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost19⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:920
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f20⤵
- Scheduled Task/Job: Scheduled Task
PID:1552
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\SiWel7iYtv2W.bat" "20⤵PID:4032
-
C:\Windows\system32\chcp.comchcp 6500121⤵PID:4560
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost21⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3692
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f22⤵
- Scheduled Task/Job: Scheduled Task
PID:5024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\Bh8D8MPc5qy4.bat" "22⤵PID:1620
-
C:\Windows\system32\chcp.comchcp 6500123⤵PID:4488
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost23⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1016
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f24⤵
- Scheduled Task/Job: Scheduled Task
PID:1420
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\zTGhIMEJFQqv.bat" "24⤵PID:4472
-
C:\Windows\system32\chcp.comchcp 6500125⤵PID:3372
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost25⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:760
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f26⤵
- Scheduled Task/Job: Scheduled Task
PID:1280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\F9HfI1cK4zBV.bat" "26⤵PID:1840
-
C:\Windows\system32\chcp.comchcp 6500127⤵PID:1232
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost27⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1056
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f28⤵
- Scheduled Task/Job: Scheduled Task
PID:3484
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\7dGoTbaaoGZM.bat" "28⤵PID:2788
-
C:\Windows\system32\chcp.comchcp 6500129⤵PID:2940
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost29⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1860
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f30⤵
- Scheduled Task/Job: Scheduled Task
PID:764
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\M8gjDWePxwaq.bat" "30⤵PID:4800
-
C:\Windows\system32\chcp.comchcp 6500131⤵PID:3996
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost31⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1904
-
-
C:\Users\Admin\AppData\Roaming\WordW\Word.exe"C:\Users\Admin\AppData\Roaming\WordW\Word.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "System" /sc ONLOGON /tr "C:\Users\Admin\AppData\Roaming\WordW\Word.exe" /rl HIGHEST /f32⤵
- Scheduled Task/Job: Scheduled Task
PID:1564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\6sH0dgGAE66Q.bat" "32⤵PID:2348
-
C:\Windows\system32\chcp.comchcp 6500133⤵PID:472
-
-
C:\Windows\system32\PING.EXEping -n 10 localhost33⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:416
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\bin\S^X.exe"C:\Users\Admin\AppData\Local\Temp\bin\S^X.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 860 -s 9963⤵
- Program crash
PID:4592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 860 -ip 8601⤵PID:3268
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5baf55b95da4a601229647f25dad12878
SHA1abc16954ebfd213733c4493fc1910164d825cac8
SHA256ee954c5d8156fd8890e582c716e5758ed9b33721258f10e758bdc31ccbcb1924
SHA51224f502fedb1a305d0d7b08857ffc1db9b2359ff34e06d5748ecc84e35c985f29a20d9f0a533bea32d234ab37097ec0481620c63b14ac89b280e75e14d19fd545
-
Filesize
2.2MB
MD52d86c4ad18524003d56c1cb27c549ba8
SHA1123007f9337364e044b87deacf6793c2027c8f47
SHA256091ab8a1acdab40c544bd1e5c91a96881acc318cac4df5235e1b5673f5489280
SHA5120dd5204733b3c20932aeea2cebf0ca1eeca70e4b3b3b8932d78d952a8f762f0b96ebdbdaf217e95889c02ec6a39b8f9919fd4c0cba56bb629256e71fa61faa3c
-
Filesize
204B
MD5896737d4815b440463122542ed813dad
SHA190fcb14c3f255bc31af17df7691eb3f5a0c76e1c
SHA2566bcca93c23f02651b6d9f61d3d0c1f95936642e3b547ba2c25b4f44bcf6d9da6
SHA512380b3c86399555efc7452f6787c49f952e93a6def9d39cbf55778a33cb96536c8131c4d1f1f11214e00758ad19725625236cf2de814149b3a6c025adbe6f0740
-
Filesize
204B
MD572c386b083387febe720f3e7b8504d3a
SHA1f2ab194dabb1838d95f9e0daf5e2b91dfd764323
SHA25627d075f331c2fccfab2e2c63653f5065d93eba80cbe9b8cd2a2cfc7d07b7255e
SHA512f2f9c695762bb3fbb59134b24c2d015610d58011f8513b46776aa01681f8189fcabfbe33a3c90c63dea9faa7d2735eb04148dbff337760304956aa9ebb0a3039
-
Filesize
204B
MD53965b073e7d232ae29072dd055b10427
SHA102194d7b0ae28109857a3315dc6fd793a89c6be7
SHA2568920c0aabde5bf339f1d33ae27834f622f4c72fd0a4f9248042c9add73288895
SHA51267023c48998cd9aef5c033af9309baf26006c01d2b30782ba9b2869a80b5c2506057b1ebce1bf2ff8b91f23167188435e2a2978d1b1b71235f16617087c8877f
-
Filesize
204B
MD5cbff79d905ec8a429d4660d3eacdd3a3
SHA1b69d4b479662e8ae9caf778521301268038bb671
SHA25673a8cf2a53959031e50409001717e5bb962004907ccab35ac84868153cff2c10
SHA51269ce7f00674d33da8bd9457b3daa5e7763f8d5c4348f0e34dc5285409eacb028bd8759394bfb41983d16e0ba68bc029e74e43d0e700ae2258db98143c52872f0
-
Filesize
204B
MD5b0ce14ca229c0dd84decb61d075fd317
SHA1a8129b8ca24f61897bf463e189bf82b572bb5f3b
SHA256629cf87bf36876d93f1619bfefe42891f2692bc26e88fd8f6b46ec5f67147249
SHA5121af471ea0d389abb12a3ebb08cba619aefa2cae8220b01f5ac02b6df2a255cfd41acd674d8fec2396a135591cff40ee7d65e6a0559241488f7050fb39c9a99b3
-
Filesize
204B
MD51e0aae5da8946f8e58c29544759bd778
SHA1907ac1e743e97a9c3e6742b89400289165c98354
SHA2560ba5e538073ab6a62710869acdb14da81ee218ab7a68ceb635a8c311db1ed012
SHA5129bdb72fd79773a8ed66c8b3c49fdaa635e106dc338454466fb69af91cf8595acf4b4e420c4cb9b849024692f8bd958c3f7460162250fb81d335242f135393487
-
Filesize
204B
MD5dc522458685f478d6ad1a8daa722eec7
SHA1de971af074bbedb9a8c43b12c7f5143d9a102d2e
SHA2568a504f18065617913899f19e6c965375ba305ee3edadf5caa57f062886ed6c14
SHA5121e47c1a569718721294282efcf453213441286bdfb4e9d1cbd06436cf9ed191ffafb0fe1c420dc0b9144bcdafcd2fcad6b6c81664f1f2fbe12ef855cec629661
-
Filesize
204B
MD5742c973a9e05ca350ce0338b601cdda3
SHA18ae6f6338ff7eba0e6121a9634ece2396d7ab4c1
SHA25669f374f3c583008e71a20487ef8d3faf14c9847c1037c05472b0d3e759bca25c
SHA5120c391f8dc8bffb48425955e4b4077eb3736243bbf0797ef2757e7f0ca3b91553620c37009cbd6a452e0d9bfc3753f88787bce4fe2eff5538b99a507d6635d9ea
-
Filesize
204B
MD5f6957f58cb47db54fbbe1b143d8839b2
SHA102f4bd6138bd80cb3919944018e6eb09fa5632b7
SHA2565ff0cb8b5467441a611207b595b80c71f2ea76cbf5d7cb2e012d965da624faae
SHA51225615164942a25868a7d94d72e9c409c25bcd38f17bd134a91bd68768a460ba5db7bc143d93b10be8d7aea4ff6f8f0f0e69804dd97f29489732d67cbd527fea1
-
Filesize
204B
MD5cd0a6dabda1d1a5d0713e0bf5356b7a5
SHA172d8bd9ce67d7c75476a83d9c4c5af05240a1045
SHA25681081721f5e2f4f1be3e0f7dd27c18482b983e360cb8df2650ad35e313abb37c
SHA5122b98f8d279f44bcb3659b59403af8de46a8cbd30a1d14de0a91797f2febb5137c4b9e5c8130f7827aa6d90e51f1e64e73abdc320578b8558033cf0acda2f7f63
-
Filesize
204B
MD5ac23de9fbce90f342e27157b62d2e8bb
SHA1b54246ef72ce0dd601b07b8bd7c38f0c3f50d0d9
SHA2569207eef6855ee4e0286ca31badc8e403c49dc8ae04be572a326bfe439ad5abea
SHA51282dafb0538378b5bf07a1975a3b11a0f8178ec471217146204963bf72ab45c7cbfab58f74cbe500b80b9e7b4ec7864399313b355c8b7afcc6685c3ea7b098f0e
-
Filesize
789KB
MD5e2437ac017506bbde9a81fb1f618457b
SHA1adef2615312b31e041ccf700b3982dd50b686c7f
SHA25694594fa46d0bd28c02365f0a32ec3a662b25df95f3f3e8e2a952c18a23895b12
SHA5129169f8be39b8fede38f7fce5a2e64d42630857e0ebd37f921c68ccf0bf0a8816f1682ba4659d22ad43413d99de62a59b2494494701404b44aa41c4d6bdc1e019
-
Filesize
204B
MD519e7c3963f5e30f1c7b29d4c3b76412e
SHA110c9f45144f9b058b03522010ff1cb094c9c8f8c
SHA2560404f76a48ed9eae6aa513d08c0ae04d44a6c1f838f0d7fbd37d18eb5ff1f4a6
SHA512352583bec0b3cac91d8966e1ea5b9aa5cb55fe9274d943484899f55ce7e2dab8c0ac2dbefcf99d3d4e58f9f474d9f1c8ddbe43fc721e46a070e3dc5a05144cfa
-
Filesize
204B
MD5c4cce2fa61126541d6a242877f152dba
SHA1813ef54e7b42a47b22ecb81180bc4b8881509056
SHA2565a6ccfef698ad19084af8383fa93f77c560ec9fc999307ca414ab205a75b4f23
SHA512f636293e8b51d328241f080b2bda705dbe2572f89bb60e17c405b2b43162425b89374b75a3664d3644213521d712833c4b7929e7e49e9c76f1ef6ea15fc778ce
-
Filesize
204B
MD5e1a4bc9e18c4aa033821f43cfc9bc4aa
SHA1820018505cac548fd151848ee17824390cf13a39
SHA2568daf6d7fca733380b6b97acd28ddc40d1c0bcfa7b274ab268c5d3eb23417fdd1
SHA5120a2464a038918d747c0dc8e35fc61cc35045e5a03cda86df09db9bc482d37be2eb2ce5c2fc765cd2eb458acba2ed432b68132f2d5ba7f83b6337a72d64442dbc
-
Filesize
204B
MD57b0520c420488b68349dc64fd683b2ec
SHA17247b126e37c44b108c0043bf1f7fca91d6322b7
SHA256ebe3e468fad926b9751dbbe2a60a497bf1cb5da10e7524b642cee87882f40cea
SHA512ce06ccd527ae636bda3d2ed7a5ba3097cc1e681c615cb64de6d2284557457c6842bc4bbe911eedeeeb0f06fdf7cf790397b5b3c48cb7544b6c0f955ef2509877
-
Filesize
502KB
MD56be4bd44032a94198e8809edcc647f58
SHA17a46c39d01ae48e619cbebc9d9a8951db71f09f0
SHA25612f9c355a6280b8c51f233ecda941dfb5d59a8830547690606fdafd755852772
SHA5126fbcf0a05dcb0d27be4812caa339c377a1ca0d1def29263f6b9e4e1c572076285eae682d22203410953a0f48c23f229aa8868657120f77486dad713b8df38df4