Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
22/02/2025, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe
-
Size
537KB
-
MD5
1a6c282a8b1e155b126fbf4f3c0d6480
-
SHA1
832fab3b01a8a3511a88780862c14beb094bd58c
-
SHA256
56c83a40ef306aad0fb12225d466d5d6a7f21856d3b17f91df119127d9c06f5c
-
SHA512
99aa31bdc19559a005decad8f176ac8c4655c1ddb46bb55b257f5f17d9eca1372278c94578e7f1a0959af1a5a30a04dad836612739c779bbdcd97b81b342d1e8
-
SSDEEP
12288:tXyac9PSQ84Gu16eyRLiyR/z7sRrdukRUDz7NVj1KpWy4tz:t3cxpGvN/z7nZbL1CWTtz
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 10 IoCs
resource yara_rule behavioral2/memory/1748-55-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-51-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-68-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-70-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-73-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-75-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-77-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-80-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-82-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral2/memory/1748-84-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\New folder\ufile.exe = "C:\\Users\\Admin\\AppData\\Roaming\\New folder\\ufile.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\utorrent.exe = "C:\\Users\\Admin\\AppData\\Roaming\\utorrent.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\Control Panel\International\Geo\Nation JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe -
Executes dropped EXE 3 IoCs
pid Process 3944 ufile.exe 4248 ufile.exe 1748 ufile.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1479699283-3000499823-2337359760-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\appmanager = "C:\\Users\\Admin\\AppData\\Roaming\\New folder\\ufile.exe" reg.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4436 set thread context of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 3944 set thread context of 4248 3944 ufile.exe 97 PID 3944 set thread context of 1748 3944 ufile.exe 98 -
resource yara_rule behavioral2/memory/4440-9-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4440-11-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4440-13-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4440-43-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4440-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4248-66-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ufile.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 668 reg.exe 4468 reg.exe 2100 reg.exe 2340 reg.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 1 1748 ufile.exe Token: SeCreateTokenPrivilege 1748 ufile.exe Token: SeAssignPrimaryTokenPrivilege 1748 ufile.exe Token: SeLockMemoryPrivilege 1748 ufile.exe Token: SeIncreaseQuotaPrivilege 1748 ufile.exe Token: SeMachineAccountPrivilege 1748 ufile.exe Token: SeTcbPrivilege 1748 ufile.exe Token: SeSecurityPrivilege 1748 ufile.exe Token: SeTakeOwnershipPrivilege 1748 ufile.exe Token: SeLoadDriverPrivilege 1748 ufile.exe Token: SeSystemProfilePrivilege 1748 ufile.exe Token: SeSystemtimePrivilege 1748 ufile.exe Token: SeProfSingleProcessPrivilege 1748 ufile.exe Token: SeIncBasePriorityPrivilege 1748 ufile.exe Token: SeCreatePagefilePrivilege 1748 ufile.exe Token: SeCreatePermanentPrivilege 1748 ufile.exe Token: SeBackupPrivilege 1748 ufile.exe Token: SeRestorePrivilege 1748 ufile.exe Token: SeShutdownPrivilege 1748 ufile.exe Token: SeDebugPrivilege 1748 ufile.exe Token: SeAuditPrivilege 1748 ufile.exe Token: SeSystemEnvironmentPrivilege 1748 ufile.exe Token: SeChangeNotifyPrivilege 1748 ufile.exe Token: SeRemoteShutdownPrivilege 1748 ufile.exe Token: SeUndockPrivilege 1748 ufile.exe Token: SeSyncAgentPrivilege 1748 ufile.exe Token: SeEnableDelegationPrivilege 1748 ufile.exe Token: SeManageVolumePrivilege 1748 ufile.exe Token: SeImpersonatePrivilege 1748 ufile.exe Token: SeCreateGlobalPrivilege 1748 ufile.exe Token: 31 1748 ufile.exe Token: 32 1748 ufile.exe Token: 33 1748 ufile.exe Token: 34 1748 ufile.exe Token: 35 1748 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe Token: SeDebugPrivilege 4248 ufile.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 3944 ufile.exe 4248 ufile.exe 1748 ufile.exe 1748 ufile.exe 1748 ufile.exe 1748 ufile.exe -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4436 wrote to memory of 4440 4436 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 90 PID 4440 wrote to memory of 4488 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 91 PID 4440 wrote to memory of 4488 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 91 PID 4440 wrote to memory of 4488 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 91 PID 4488 wrote to memory of 4180 4488 cmd.exe 94 PID 4488 wrote to memory of 4180 4488 cmd.exe 94 PID 4488 wrote to memory of 4180 4488 cmd.exe 94 PID 4440 wrote to memory of 3944 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 95 PID 4440 wrote to memory of 3944 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 95 PID 4440 wrote to memory of 3944 4440 JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe 95 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 4248 3944 ufile.exe 97 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 3944 wrote to memory of 1748 3944 ufile.exe 98 PID 1748 wrote to memory of 844 1748 ufile.exe 99 PID 1748 wrote to memory of 844 1748 ufile.exe 99 PID 1748 wrote to memory of 844 1748 ufile.exe 99 PID 1748 wrote to memory of 976 1748 ufile.exe 100 PID 1748 wrote to memory of 976 1748 ufile.exe 100 PID 1748 wrote to memory of 976 1748 ufile.exe 100 PID 1748 wrote to memory of 396 1748 ufile.exe 102 PID 1748 wrote to memory of 396 1748 ufile.exe 102 PID 1748 wrote to memory of 396 1748 ufile.exe 102 PID 1748 wrote to memory of 4824 1748 ufile.exe 104 PID 1748 wrote to memory of 4824 1748 ufile.exe 104 PID 1748 wrote to memory of 4824 1748 ufile.exe 104 PID 396 wrote to memory of 4468 396 cmd.exe 107 PID 396 wrote to memory of 4468 396 cmd.exe 107 PID 396 wrote to memory of 4468 396 cmd.exe 107 PID 976 wrote to memory of 2340 976 cmd.exe 108 PID 976 wrote to memory of 2340 976 cmd.exe 108 PID 976 wrote to memory of 2340 976 cmd.exe 108 PID 844 wrote to memory of 2100 844 cmd.exe 109 PID 844 wrote to memory of 2100 844 cmd.exe 109 PID 844 wrote to memory of 2100 844 cmd.exe 109 PID 4824 wrote to memory of 668 4824 cmd.exe 110 PID 4824 wrote to memory of 668 4824 cmd.exe 110 PID 4824 wrote to memory of 668 4824 cmd.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_1a6c282a8b1e155b126fbf4f3c0d6480.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\IWVHQ.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "appmanager" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\New folder\ufile.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4180
-
-
-
C:\Users\Admin\AppData\Roaming\New folder\ufile.exe"C:\Users\Admin\AppData\Roaming\New folder\ufile.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Users\Admin\AppData\Roaming\New folder\ufile.exe"C:\Users\Admin\AppData\Roaming\New folder\ufile.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4248
-
-
C:\Users\Admin\AppData\Roaming\New folder\ufile.exe"C:\Users\Admin\AppData\Roaming\New folder\ufile.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\New folder\ufile.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\New folder\ufile.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\New folder\ufile.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\New folder\ufile.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2340
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4468
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\utorrent.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\utorrent.exe:*:Enabled:Windows Messanger" /f5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\utorrent.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\utorrent.exe:*:Enabled:Windows Messanger" /f6⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:668
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
148B
MD5c9bd4b402320f2f4fea47eb3b321cf62
SHA1c7e89db79bc7c0d3480cb648855e9ecf685477cf
SHA256cd8461d7cd4d2ffcc6b83218d9bd9d13f3bdde2fd252f7ea723742393131d949
SHA51280647cd1b15b7eba541227539a1d170020538bb32f7841a6b6cef436fdf1f9c92ad2c5eab8c9201ed80695c1efb0f404b813a5b15c889d406d26320891795de5
-
Filesize
537KB
MD5481b637e4d4de466a58ace03cb268287
SHA1772ac57bc9461a9075a339d3c7125a415939bc15
SHA2564354c6211264d74a4c3f8fff878501bf3e566a6e84709f2bc9c71c7e85465568
SHA512cd2c3787401237247a8c9b28d960c7391006a8cd32a4930d1bd5b70da51d3d499ee51d633281f761f9b2940cc472a72588fa41ba1090158a0fa63fb86b3ff385