Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
06/02/2025, 09:28
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
Resource
win10v2004-20250129-en
General
-
Target
JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe
-
Size
3.3MB
-
MD5
a9a86cc663da436d7cb53716088f7b94
-
SHA1
bb63636ec07e6efadc3854462cdb99a6ff1500c3
-
SHA256
8041b51c8456106f557803b98c4579c2e720f4b5a184a853c19a3155ffa44b11
-
SHA512
2a90ad5e1bb420f289d80340be0ebce70c7734f6848eb1163b8074cb00bc82dd21c452b53b5fa4fea4d59d8fd42d7a3e9d1c87abb1f479f0633a92531debf32b
-
SSDEEP
98304:o06cZJ+wPOa2lMqvB4buVEucwK1EFrAg:o8/+wP0j4bu6ufK1EFr
Malware Config
Signatures
-
Darkcomet family
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\svchost\\svchost.exe" JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Checks BIOS information in registry 2 TTPs 3 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\International\Geo\Nation JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Executes dropped EXE 5 IoCs
pid Process 4008 Beepa.Fraps.v3.2.3.11796.retail.exe 3468 svchost.exe 3480 Beepa.Fraps.v3.2.3.11796.retail.exe 5016 svchost.exe 4708 Beepa.Fraps.v3.2.3.11796.retail.exe -
Loads dropped DLL 6 IoCs
pid Process 4008 Beepa.Fraps.v3.2.3.11796.retail.exe 3480 Beepa.Fraps.v3.2.3.11796.retail.exe 4708 Beepa.Fraps.v3.2.3.11796.retail.exe 4008 Beepa.Fraps.v3.2.3.11796.retail.exe 4708 Beepa.Fraps.v3.2.3.11796.retail.exe 3480 Beepa.Fraps.v3.2.3.11796.retail.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost\\svchost.exe" JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\svchost\\svchost.exe" notepad.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 440 set thread context of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 3468 set thread context of 5016 3468 svchost.exe 101 PID 5016 set thread context of 1868 5016 svchost.exe 102 PID 1868 set thread context of 3640 1868 explorer.exe 106 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\svchost\svchost.exe JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe File opened for modification C:\Windows\svchost\svchost.exe JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe File opened for modification C:\Windows\svchost\ JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe File created C:\Windows\svchost\svchost.exe notepad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notepad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beepa.Fraps.v3.2.3.11796.retail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beepa.Fraps.v3.2.3.11796.retail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Beepa.Fraps.v3.2.3.11796.retail.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
NSIS installer 3 IoCs
resource yara_rule behavioral2/files/0x000d000000023a9e-6.dat nsis_installer_1 behavioral2/files/0x000d000000023a9e-6.dat nsis_installer_2 behavioral2/files/0x000c000000023aba-32.dat nsis_installer_2 -
Checks processor information in registry 2 TTPs 12 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString explorer.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier explorer.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3640 explorer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSecurityPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeTakeOwnershipPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeLoadDriverPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSystemProfilePrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSystemtimePrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeProfSingleProcessPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeIncBasePriorityPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeCreatePagefilePrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeBackupPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeRestorePrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeShutdownPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeDebugPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeSystemEnvironmentPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeChangeNotifyPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeRemoteShutdownPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeUndockPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeManageVolumePrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeImpersonatePrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeCreateGlobalPrivilege 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 33 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 34 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 35 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: 36 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe Token: SeIncreaseQuotaPrivilege 5016 svchost.exe Token: SeSecurityPrivilege 5016 svchost.exe Token: SeTakeOwnershipPrivilege 5016 svchost.exe Token: SeLoadDriverPrivilege 5016 svchost.exe Token: SeSystemProfilePrivilege 5016 svchost.exe Token: SeSystemtimePrivilege 5016 svchost.exe Token: SeProfSingleProcessPrivilege 5016 svchost.exe Token: SeIncBasePriorityPrivilege 5016 svchost.exe Token: SeCreatePagefilePrivilege 5016 svchost.exe Token: SeBackupPrivilege 5016 svchost.exe Token: SeRestorePrivilege 5016 svchost.exe Token: SeShutdownPrivilege 5016 svchost.exe Token: SeDebugPrivilege 5016 svchost.exe Token: SeSystemEnvironmentPrivilege 5016 svchost.exe Token: SeChangeNotifyPrivilege 5016 svchost.exe Token: SeRemoteShutdownPrivilege 5016 svchost.exe Token: SeUndockPrivilege 5016 svchost.exe Token: SeManageVolumePrivilege 5016 svchost.exe Token: SeImpersonatePrivilege 5016 svchost.exe Token: SeCreateGlobalPrivilege 5016 svchost.exe Token: 33 5016 svchost.exe Token: 34 5016 svchost.exe Token: 35 5016 svchost.exe Token: 36 5016 svchost.exe Token: SeIncreaseQuotaPrivilege 3640 explorer.exe Token: SeSecurityPrivilege 3640 explorer.exe Token: SeTakeOwnershipPrivilege 3640 explorer.exe Token: SeLoadDriverPrivilege 3640 explorer.exe Token: SeSystemProfilePrivilege 3640 explorer.exe Token: SeSystemtimePrivilege 3640 explorer.exe Token: SeProfSingleProcessPrivilege 3640 explorer.exe Token: SeIncBasePriorityPrivilege 3640 explorer.exe Token: SeCreatePagefilePrivilege 3640 explorer.exe Token: SeBackupPrivilege 3640 explorer.exe Token: SeRestorePrivilege 3640 explorer.exe Token: SeShutdownPrivilege 3640 explorer.exe Token: SeDebugPrivilege 3640 explorer.exe Token: SeSystemEnvironmentPrivilege 3640 explorer.exe Token: SeChangeNotifyPrivilege 3640 explorer.exe Token: SeRemoteShutdownPrivilege 3640 explorer.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 3468 svchost.exe 1868 explorer.exe 3640 explorer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 440 wrote to memory of 4008 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 88 PID 440 wrote to memory of 4008 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 88 PID 440 wrote to memory of 4008 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 88 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 440 wrote to memory of 744 440 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 95 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 680 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 96 PID 744 wrote to memory of 1248 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 97 PID 744 wrote to memory of 1248 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 97 PID 744 wrote to memory of 1248 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 97 PID 744 wrote to memory of 3468 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 98 PID 744 wrote to memory of 3468 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 98 PID 744 wrote to memory of 3468 744 JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe 98 PID 3468 wrote to memory of 3480 3468 svchost.exe 100 PID 3468 wrote to memory of 3480 3468 svchost.exe 100 PID 3468 wrote to memory of 3480 3468 svchost.exe 100 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 3468 wrote to memory of 5016 3468 svchost.exe 101 PID 5016 wrote to memory of 1868 5016 svchost.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4008
-
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a9a86cc663da436d7cb53716088f7b94.exe"2⤵
- Modifies WinLogon for persistence
- Checks BIOS information in registry
- Checks computer location settings
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:680
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"3⤵PID:1248
-
-
C:\Windows\svchost\svchost.exe"C:\Windows\svchost\svchost.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3480
-
-
C:\Windows\svchost\svchost.exe"C:\Windows\svchost\svchost.exe"4⤵
- Checks BIOS information in registry
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"5⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"C:\Users\Admin\AppData\Local\Temp\Beepa.Fraps.v3.2.3.11796.retail.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4708
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"6⤵
- Checks BIOS information in registry
- System Location Discovery: System Language Discovery
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3640 -
C:\Windows\SysWOW64\notepad.exeC:\Windows\SysWOW64\notepad.exe7⤵
- System Location Discovery: System Language Discovery
PID:64
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.5MB
MD591e827bc0281f6a3c1413332cd7cefee
SHA15fdbe6e02ab1bdeb4c0af61545be0a85bb1f186f
SHA256e85bb6764b82f43c71a3364d6c9a06c640242efdcd805e9fc54fa227545d6ac5
SHA512cf005600b44433e6ae457de7da1bec826e3b6400f99e287472c9538a850272446b71c33ba319f1f87b6f698e1e0ecf97003e0f75e5ada72927577f830bbf46a2
-
Filesize
386KB
MD52707dcacb5a91e821ba0b19a36e0bd80
SHA1d1df596f3d7575b27016f5002ce21c00879895e3
SHA256a09519cae3faca1f43cab115233a745d20312a3e22e7ecd809b291079a8691f2
SHA512dfd9a8e97151107ef2ef3a9eb274b695ca633c314ff5f3d41b3750a9d9d70fee84993a63b61acf9b0de6aebbc59554ea75af22b5eb3ac78d354567342ff27c24
-
Filesize
6KB
MD513cc92f90a299f5b2b2f795d0d2e47dc
SHA1aa69ead8520876d232c6ed96021a4825e79f542f
SHA256eb1ca2b3a6e564c32677d0cdc388e26b74ef686e071d7dbca44d0bfa10488feb
SHA512ff4e6e6e7104568fc85ef3a3f0494a5c7822a4ceaf65c584ad534f08f9a472a8d86f0a62f1f86343c61e2540b2254714b7ea43e4b312ff13d8271ff069386fa3
-
Filesize
7KB
MD5a4173b381625f9f12aadb4e1cdaefdb8
SHA1cf1680c2bc970d5675adbf5e89292a97e6724713
SHA2567755ff2707ca19344d489a5acec02d9e310425fa6e100d2f13025761676b875b
SHA512fcac79d42862da6bdd3ecad9d887a975cdff2301a8322f321be58f754a26b27077b452faa4751bbd09cd3371b4afce65255fbbb443e2c93dd2cba0ba652f4a82
-
Filesize
3.3MB
MD5a9a86cc663da436d7cb53716088f7b94
SHA1bb63636ec07e6efadc3854462cdb99a6ff1500c3
SHA2568041b51c8456106f557803b98c4579c2e720f4b5a184a853c19a3155ffa44b11
SHA5122a90ad5e1bb420f289d80340be0ebce70c7734f6848eb1163b8074cb00bc82dd21c452b53b5fa4fea4d59d8fd42d7a3e9d1c87abb1f479f0633a92531debf32b