Analysis
-
max time kernel
148s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
02/03/2025, 10:54
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe
-
Size
700KB
-
MD5
3fc5b83fa65d7d09f83b9c2f6f60e8ce
-
SHA1
9215a586003885fd92107ff03dd4f016d460f6fa
-
SHA256
70313ae036ec75401b0b91ec06330572648a09f5e2a17b54315ea276630f4e2a
-
SHA512
62a6eafa29e729d87ea9a1b14aa05d2b6dbe596adeea5d76dee82ae9631a9310d4c49f378688f965d08f405a243c4c5b76ca78794eb4385b9d0d17eaf9199ee3
-
SSDEEP
12288:7hIxtRSqedX/75S9VKMreV5VoxLieB9CtV6tU+YsvqamctoJX4zNvGlEVFxhff:+xtiS9VBebkLCjzEA4zxCSFxhff
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 9 IoCs
resource yara_rule behavioral1/memory/2900-89-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-98-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-101-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-105-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-108-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-111-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-115-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-118-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral1/memory/2900-121-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
ISR Stealer
ISR Stealer is a modified version of Hackhound Stealer written in visual basic.
-
ISR Stealer payload 1 IoCs
resource yara_rule behavioral1/files/0x0008000000015e37-29.dat family_isrstealer -
Isrstealer family
-
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\A1Z7zq562.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\bot.exe = "C:\\Users\\Admin\\AppData\\Roaming\\bot.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Executes dropped EXE 6 IoCs
pid Process 2368 bot (2).exe 3008 Server.exe 2964 A1Z7zq562.exe 2928 svchost.exe 2860 A1Z7zq562.exe 2900 A1Z7zq562.exe -
Loads dropped DLL 11 IoCs
pid Process 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2368 bot (2).exe 2368 bot (2).exe 2368 bot (2).exe 2964 A1Z7zq562.exe 2860 A1Z7zq562.exe -
Reads data files stored by FTP clients 2 TTPs
Tries to access configuration files associated with programs like FileZilla.
-
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" bot (2).exe -
Enumerates connected drives 3 TTPs 21 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\K: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\V: svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe File opened for modification \??\PhysicalDrive0 A1Z7zq562.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2072 set thread context of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2964 set thread context of 2860 2964 A1Z7zq562.exe 36 PID 2860 set thread context of 2900 2860 A1Z7zq562.exe 37 -
resource yara_rule behavioral1/memory/2900-89-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-88-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-86-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-83-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-81-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-98-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-101-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-105-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-108-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-111-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-115-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-118-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral1/memory/2900-121-0x0000000000400000-0x0000000000473000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 16 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A1Z7zq562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bot (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A1Z7zq562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language A1Z7zq562.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Charset Server.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\MIME\Database\Codepage Server.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1968 reg.exe 1916 reg.exe 2128 reg.exe 2136 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3008 Server.exe 3008 Server.exe 3008 Server.exe 3008 Server.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 2900 A1Z7zq562.exe Token: SeCreateTokenPrivilege 2900 A1Z7zq562.exe Token: SeAssignPrimaryTokenPrivilege 2900 A1Z7zq562.exe Token: SeLockMemoryPrivilege 2900 A1Z7zq562.exe Token: SeIncreaseQuotaPrivilege 2900 A1Z7zq562.exe Token: SeMachineAccountPrivilege 2900 A1Z7zq562.exe Token: SeTcbPrivilege 2900 A1Z7zq562.exe Token: SeSecurityPrivilege 2900 A1Z7zq562.exe Token: SeTakeOwnershipPrivilege 2900 A1Z7zq562.exe Token: SeLoadDriverPrivilege 2900 A1Z7zq562.exe Token: SeSystemProfilePrivilege 2900 A1Z7zq562.exe Token: SeSystemtimePrivilege 2900 A1Z7zq562.exe Token: SeProfSingleProcessPrivilege 2900 A1Z7zq562.exe Token: SeIncBasePriorityPrivilege 2900 A1Z7zq562.exe Token: SeCreatePagefilePrivilege 2900 A1Z7zq562.exe Token: SeCreatePermanentPrivilege 2900 A1Z7zq562.exe Token: SeBackupPrivilege 2900 A1Z7zq562.exe Token: SeRestorePrivilege 2900 A1Z7zq562.exe Token: SeShutdownPrivilege 2900 A1Z7zq562.exe Token: SeDebugPrivilege 2900 A1Z7zq562.exe Token: SeAuditPrivilege 2900 A1Z7zq562.exe Token: SeSystemEnvironmentPrivilege 2900 A1Z7zq562.exe Token: SeChangeNotifyPrivilege 2900 A1Z7zq562.exe Token: SeRemoteShutdownPrivilege 2900 A1Z7zq562.exe Token: SeUndockPrivilege 2900 A1Z7zq562.exe Token: SeSyncAgentPrivilege 2900 A1Z7zq562.exe Token: SeEnableDelegationPrivilege 2900 A1Z7zq562.exe Token: SeManageVolumePrivilege 2900 A1Z7zq562.exe Token: SeImpersonatePrivilege 2900 A1Z7zq562.exe Token: SeCreateGlobalPrivilege 2900 A1Z7zq562.exe Token: 31 2900 A1Z7zq562.exe Token: 32 2900 A1Z7zq562.exe Token: 33 2900 A1Z7zq562.exe Token: 34 2900 A1Z7zq562.exe Token: 35 2900 A1Z7zq562.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 3008 Server.exe 2964 A1Z7zq562.exe 2860 A1Z7zq562.exe 2900 A1Z7zq562.exe 2900 A1Z7zq562.exe 2900 A1Z7zq562.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2072 wrote to memory of 2404 2072 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 31 PID 2404 wrote to memory of 2368 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 32 PID 2404 wrote to memory of 2368 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 32 PID 2404 wrote to memory of 2368 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 32 PID 2404 wrote to memory of 2368 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 32 PID 2404 wrote to memory of 3008 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 33 PID 2404 wrote to memory of 3008 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 33 PID 2404 wrote to memory of 3008 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 33 PID 2404 wrote to memory of 3008 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 33 PID 2404 wrote to memory of 2964 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 34 PID 2404 wrote to memory of 2964 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 34 PID 2404 wrote to memory of 2964 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 34 PID 2404 wrote to memory of 2964 2404 JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe 34 PID 2368 wrote to memory of 2928 2368 bot (2).exe 35 PID 2368 wrote to memory of 2928 2368 bot (2).exe 35 PID 2368 wrote to memory of 2928 2368 bot (2).exe 35 PID 2368 wrote to memory of 2928 2368 bot (2).exe 35 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2964 wrote to memory of 2860 2964 A1Z7zq562.exe 36 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2860 wrote to memory of 2900 2860 A1Z7zq562.exe 37 PID 2900 wrote to memory of 1512 2900 A1Z7zq562.exe 38 PID 2900 wrote to memory of 1512 2900 A1Z7zq562.exe 38 PID 2900 wrote to memory of 1512 2900 A1Z7zq562.exe 38 PID 2900 wrote to memory of 1512 2900 A1Z7zq562.exe 38 PID 2900 wrote to memory of 340 2900 A1Z7zq562.exe 39 PID 2900 wrote to memory of 340 2900 A1Z7zq562.exe 39 PID 2900 wrote to memory of 340 2900 A1Z7zq562.exe 39 PID 2900 wrote to memory of 340 2900 A1Z7zq562.exe 39 PID 2900 wrote to memory of 2592 2900 A1Z7zq562.exe 40 PID 2900 wrote to memory of 2592 2900 A1Z7zq562.exe 40 PID 2900 wrote to memory of 2592 2900 A1Z7zq562.exe 40 PID 2900 wrote to memory of 2592 2900 A1Z7zq562.exe 40 PID 2900 wrote to memory of 1764 2900 A1Z7zq562.exe 41 PID 2900 wrote to memory of 1764 2900 A1Z7zq562.exe 41 PID 2900 wrote to memory of 1764 2900 A1Z7zq562.exe 41 PID 2900 wrote to memory of 1764 2900 A1Z7zq562.exe 41 PID 340 wrote to memory of 2136 340 cmd.exe 46 PID 340 wrote to memory of 2136 340 cmd.exe 46 PID 340 wrote to memory of 2136 340 cmd.exe 46 PID 340 wrote to memory of 2136 340 cmd.exe 46 PID 1764 wrote to memory of 2128 1764 cmd.exe 47 PID 1764 wrote to memory of 2128 1764 cmd.exe 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_3fc5b83fa65d7d09f83b9c2f6f60e8ce.exe"2⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\bot (2).exe"C:\Users\Admin\AppData\Local\Temp\bot (2).exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe"4⤵
- Executes dropped EXE
- Enumerates connected drives
- System Location Discovery: System Language Discovery
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Server.exe"C:\Users\Admin\AppData\Local\Temp\Server.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe"C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe"C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe"C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f7⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1968
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe:*:Enabled:Windows Messanger" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\A1Z7zq562.exe:*:Enabled:Windows Messanger" /f7⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2136
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f6⤵
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f7⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1916
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\bot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\bot.exe:*:Enabled:Windows Messanger" /f7⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2128
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
3Pre-OS Boot
1Bootkit
1Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
2Credentials In Files
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD557b97c1ab59765101441f95d90670b4f
SHA18a576f8102f418f59b6ddbcc1a84299e81aece43
SHA256ee3557ca77ab8bedc49f5d7c55c278fd374a818617857b96e4471e181d72200d
SHA512cdb184136dd2b7fe12a315db65d4f17ed89c9811e491955cd969f5e6ac751bde267ef12f9c4ff79ea16ea5a363c67d0c9e7554b1313f49364f14f711537d601b
-
Filesize
332KB
MD5ba5aac079caacb4fb1ecd39e7350a5b1
SHA1b19c80ae8758990b1ed0252d5b33d40c050df3d5
SHA256afb68924dcba04d8a37241c50a3795dca4976886f0ce3ce104f62ba54cb71435
SHA512a7a116a75b3e0f760e332cd2a3b013e2152e820459aa06cf980e3decd9d01287da8dd6dc43997a4daaa7ef1bc922390a3dc8fdd03282ce7b11e5fa4f3ea72680
-
Filesize
76KB
MD5c42235295f14a41e311f0fb12df25993
SHA1f5c1bac4ddbc54159b9fc306d460477a334f3b2c
SHA2569ef27dbb8625812d1e45d38f1d897e88ca48077bc630f6c9cd8352d0a5ada39c
SHA5129b749496f2ef75dda3a039e4381ce1aa057abff42f40bf5c3c67284c755bc0a22148520ec467438dc373e6f6eb4ee708d2eea6ceda569141fcbfd8fdebaf16ae