Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06/02/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
-
Size
3.3MB
-
MD5
a9a86cc663da436d7cb53716088f7b94
-
SHA1
bb63636ec07e6efadc3854462cdb99a6ff1500c3
-
SHA256
8041b51c8456106f557803b98c4579c2e720f4b5a184a853c19a3155ffa44b11
-
SHA512
2a90ad5e1bb420f289d80340be0ebce70c7734f6848eb1163b8074cb00bc82dd21c452b53b5fa4fea4d59d8fd42d7a3e9d1c87abb1f479f0633a92531debf32b
-
SSDEEP
98304:o06cZJ+wPOa2lMqvB4buVEucwK1EFrAg:o8/+wP0j4bu6ufK1EFr
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\svchost\\svchost.exe" JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svchost.exe -
Executes dropped EXE 5 IoCs
pid Process 2412 Beepa.Fraps.v3.2.3.11796.retail.exe 2684 svchost.exe 2884 Beepa.Fraps.v3.2.3.11796.retail.exe 1412 svchost.exe 2444 Beepa.Fraps.v3.2.3.11796.retail.exe -
Loads dropped DLL 11 IoCs
pid Process 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 2412 Beepa.Fraps.v3.2.3.11796.retail.exe 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 2684 svchost.exe 2884 Beepa.Fraps.v3.2.3.11796.retail.exe 2448 explorer.exe 2444 Beepa.Fraps.v3.2.3.11796.retail.exe 2412 Beepa.Fraps.v3.2.3.11796.retail.exe 2884 Beepa.Fraps.v3.2.3.11796.retail.exe 2444 Beepa.Fraps.v3.2.3.11796.retail.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost\\svchost.exe" notepad.exe Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost\\svchost.exe" JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2356 set thread context of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2684 set thread context of 1412 2684 svchost.exe 36 PID 1412 set thread context of 2448 1412 svchost.exe 37 PID 2448 set thread context of 1780 2448 explorer.exe 39 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost\svchost.exe JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe File opened for modification C:\Windows\svchost\svchost.exe JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe File opened for modification C:\Windows\svchost\ JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe File created C:\Windows\svchost\svchost.exe notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beepa.Fraps.v3.2.3.11796.retail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beepa.Fraps.v3.2.3.11796.retail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beepa.Fraps.v3.2.3.11796.retail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral1/files/0x000a00000001202a-4.dat nsis_installer_1 behavioral1/files/0x000a00000001202a-4.dat nsis_installer_2 behavioral1/files/0x0007000000016644-70.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe -
Suspicious behavior: GetForegroundWindowSpam 4 IoCs
pid Process 1780 explorer.exe 2412 Beepa.Fraps.v3.2.3.11796.retail.exe 2444 Beepa.Fraps.v3.2.3.11796.retail.exe 2884 Beepa.Fraps.v3.2.3.11796.retail.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSecurityPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeTakeOwnershipPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeLoadDriverPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSystemProfilePrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSystemtimePrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeProfSingleProcessPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeIncBasePriorityPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeCreatePagefilePrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeBackupPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeRestorePrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeShutdownPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeDebugPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSystemEnvironmentPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeChangeNotifyPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeRemoteShutdownPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeUndockPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeManageVolumePrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeImpersonatePrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeCreateGlobalPrivilege 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 33 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 34 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 35 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeIncreaseQuotaPrivilege 1412 svchost.exe Token: SeSecurityPrivilege 1412 svchost.exe Token: SeTakeOwnershipPrivilege 1412 svchost.exe Token: SeLoadDriverPrivilege 1412 svchost.exe Token: SeSystemProfilePrivilege 1412 svchost.exe Token: SeSystemtimePrivilege 1412 svchost.exe Token: SeProfSingleProcessPrivilege 1412 svchost.exe Token: SeIncBasePriorityPrivilege 1412 svchost.exe Token: SeCreatePagefilePrivilege 1412 svchost.exe Token: SeBackupPrivilege 1412 svchost.exe Token: SeRestorePrivilege 1412 svchost.exe Token: SeShutdownPrivilege 1412 svchost.exe Token: SeDebugPrivilege 1412 svchost.exe Token: SeSystemEnvironmentPrivilege 1412 svchost.exe Token: SeChangeNotifyPrivilege 1412 svchost.exe Token: SeRemoteShutdownPrivilege 1412 svchost.exe Token: SeUndockPrivilege 1412 svchost.exe Token: SeManageVolumePrivilege 1412 svchost.exe Token: SeImpersonatePrivilege 1412 svchost.exe Token: SeCreateGlobalPrivilege 1412 svchost.exe Token: 33 1412 svchost.exe Token: 34 1412 svchost.exe Token: 35 1412 svchost.exe Token: SeIncreaseQuotaPrivilege 1780 explorer.exe Token: SeSecurityPrivilege 1780 explorer.exe Token: SeTakeOwnershipPrivilege 1780 explorer.exe Token: SeLoadDriverPrivilege 1780 explorer.exe Token: SeSystemProfilePrivilege 1780 explorer.exe Token: SeSystemtimePrivilege 1780 explorer.exe Token: SeProfSingleProcessPrivilege 1780 explorer.exe Token: SeIncBasePriorityPrivilege 1780 explorer.exe Token: SeCreatePagefilePrivilege 1780 explorer.exe Token: SeBackupPrivilege 1780 explorer.exe Token: SeRestorePrivilege 1780 explorer.exe Token: SeShutdownPrivilege 1780 explorer.exe Token: SeDebugPrivilege 1780 explorer.exe Token: SeSystemEnvironmentPrivilege 1780 explorer.exe Token: SeChangeNotifyPrivilege 1780 explorer.exe Token: SeRemoteShutdownPrivilege 1780 explorer.exe Token: SeUndockPrivilege 1780 explorer.exe Token: SeManageVolumePrivilege 1780 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 2684 svchost.exe 2448 explorer.exe 1780 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2412 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 30 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2356 wrote to memory of 2564 2356 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 31 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 2852 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 32 PID 2564 wrote to memory of 1372 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 33 PID 2564 wrote to memory of 1372 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 33 PID 2564 wrote to memory of 1372 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 33 PID 2564 wrote to memory of 1372 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 33 PID 2564 wrote to memory of 2684 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 34 PID 2564 wrote to memory of 2684 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 34 PID 2564 wrote to memory of 2684 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 34 PID 2564 wrote to memory of 2684 2564 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 34 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 2884 2684 svchost.exe 35 PID 2684 wrote to memory of 1412 2684 svchost.exe 36 PID 2684 wrote to memory of 1412 2684 svchost.exe 36 PID 2684 wrote to memory of 1412 2684 svchost.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2412
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1372
-
-
C:\Windows\svchost\svchost.exe"C:\Windows\svchost\svchost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2884
-
-
C:\Windows\svchost\svchost.exe"C:\Windows\svchost\svchost.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
PID:2444
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe7⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
386KB
MD52707dcacb5a91e821ba0b19a36e0bd80
SHA1d1df596f3d7575b27016f5002ce21c00879895e3
SHA256a09519cae3faca1f43cab115233a745d20312a3e22e7ecd809b291079a8691f2
SHA512dfd9a8e97151107ef2ef3a9eb274b695ca633c314ff5f3d41b3750a9d9d70fee84993a63b61acf9b0de6aebbc59554ea75af22b5eb3ac78d354567342ff27c24
-
Filesize
2.5MB
MD591e827bc0281f6a3c1413332cd7cefee
SHA15fdbe6e02ab1bdeb4c0af61545be0a85bb1f186f
SHA256e85bb6764b82f43c71a3364d6c9a06c640242efdcd805e9fc54fa227545d6ac5
SHA512cf005600b44433e6ae457de7da1bec826e3b6400f99e287472c9538a850272446b71c33ba319f1f87b6f698e1e0ecf97003e0f75e5ada72927577f830bbf46a2
-
Filesize
6KB
MD513cc92f90a299f5b2b2f795d0d2e47dc
SHA1aa69ead8520876d232c6ed96021a4825e79f542f
SHA256eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb
SHA512ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3
-
Filesize
7KB
MD5a4173b381625f9f12aadb4e1cdaefdb8
SHA1cf1680c2bc970d5675adbf5e89292a97e6724713
SHA2567755ff2707ca19344d489a5acec02d9e310425fa6e100d2f13025761676b875b
SHA512fcac79d42862da6bdd3ecad9d887a975cdff2301a8322f321be58f754a26b27077b452faa4751bbd09cd3371b4afce65255fbbb443e2c93dd2cba0ba652f4a82
-
Filesize
3.3MB
MD5a9a86cc663da436d7cb53716088f7b94
SHA1bb63636ec07e6efadc3854462cdb99a6ff1500c3
SHA2568041b51c8456106f557803b98c4579c2e720f4b5a184a853c19a3155ffa44b11
SHA5122a90ad5e1bb420f289d80340be0ebce70c7734f6848eb1163b8074cb00bc82dd21c452b53b5fa4fea4d59d8fd42d7a3e9d1c87abb1f479f0633a92531debf32b