Analysis
-
max time kernel
136s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
05/03/2025, 13:17
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe
-
Size
367KB
-
MD5
5236917173a949ed75ac11908d5c45cf
-
SHA1
094867156d6c068b6215ab2f32d4d7c32d550a5e
-
SHA256
27ae1c25dd321250eaebecd06916d6268b1e67b49599c84cee4a54f06e59282a
-
SHA512
d9005a0fb4a70023709a6f799531efe8a2e0c8fd1e19a2118489ca071442fdfc7738d6b8da5fc73ae212c16db58e09ce9ff79e76293b112d17a76de105546e04
-
SSDEEP
6144:QNO8nT1QzCs7sAKq/qjE01U2+8TRMz8+wJFJhuRc04ag9d8CCKHS75rZ:QU8TxjG2dMw+yFXuav3X8VWS75rZ
Malware Config
Extracted
sality
http://89.119.67.154/testo5/
http://kukutrustnet777.info/home.gif
http://kukutrustnet888.info/home.gif
http://kukutrustnet987.info/home.gif
http://www.klkjwre9fqwieluoi.info/
http://kukutrustnet777888.info/
Signatures
-
Modifies firewall policy service 3 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Sality family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Windows security bypass 2 TTPs 6 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Executes dropped EXE 1 IoCs
pid Process 4868 update.exe -
Windows security modification 2 TTPs 7 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UacDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\Svc JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\FirewallOverride = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Enumerates connected drives 3 TTPs 25 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\m: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\t: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\k: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\r: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\v: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\w: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\z: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\E: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\n: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\p: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\b: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\i: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\s: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\u: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\y: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\l: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\o: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\x: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\G: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\q: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\a: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\e: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\g: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe File opened (read-only) \??\h: JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
resource yara_rule behavioral2/memory/4320-4-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-5-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-3-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-11-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-12-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-13-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-17-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-20-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-16-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-43-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-44-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-46-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-47-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-48-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-50-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-54-0x0000000002310000-0x000000000339E000-memory.dmp upx behavioral2/memory/4320-70-0x0000000002310000-0x000000000339E000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SYSTEM.INI JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language update.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier update.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe Token: SeDebugPrivilege 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 4320 wrote to memory of 784 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 8 PID 4320 wrote to memory of 788 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 9 PID 4320 wrote to memory of 60 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 13 PID 4320 wrote to memory of 2828 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 49 PID 4320 wrote to memory of 2868 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 50 PID 4320 wrote to memory of 3056 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 52 PID 4320 wrote to memory of 3376 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 56 PID 4320 wrote to memory of 3484 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 57 PID 4320 wrote to memory of 3696 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 58 PID 4320 wrote to memory of 3792 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 59 PID 4320 wrote to memory of 3892 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 60 PID 4320 wrote to memory of 3996 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 61 PID 4320 wrote to memory of 3396 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 62 PID 4320 wrote to memory of 5092 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 64 PID 4320 wrote to memory of 4584 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 75 PID 4320 wrote to memory of 2528 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 77 PID 4320 wrote to memory of 3528 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 78 PID 4320 wrote to memory of 2524 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 79 PID 4320 wrote to memory of 2816 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 80 PID 4320 wrote to memory of 4968 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 86 PID 4320 wrote to memory of 4868 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 89 PID 4320 wrote to memory of 4868 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 89 PID 4320 wrote to memory of 4868 4320 JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe 89 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe
Processes
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:784
-
C:\Windows\system32\fontdrvhost.exe"fontdrvhost.exe"1⤵PID:788
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:60
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2828
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2868
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:3056
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3376
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5236917173a949ed75ac11908d5c45cf.exe"2⤵
- Modifies firewall policy service
- UAC bypass
- Windows security bypass
- Windows security modification
- Checks whether UAC is enabled
- Enumerates connected drives
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:4320 -
\??\c:\d\update\update.exec:\d\update\update.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
PID:4868
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3484
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3696
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3792
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3892
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:3996
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3396
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:5092
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4584
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2528
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:3528
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppXmtcan0h2tfbfy7k9kn8hbxb6dmzz1zh0.mca1⤵PID:2524
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2816
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4968
Network
MITRE ATT&CK Enterprise v15
Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
4Disable or Modify System Firewall
1Disable or Modify Tools
3Modify Registry
5Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
295KB
MD5add3bd7b7c57792a39f2ec8672c8f718
SHA192420ce9be369ef5a41da5fc28a2cd64968f2edc
SHA25694aa8cf0ffc00f7c91232d774bb0c5f5925ffad3801f41e17a2045caf0f86436
SHA512297a6dcc3d1acee89cb6c527a46a2f0319c9e2f7f510d1861594ba7b467cb809cdff200650195d5bd9f79432ca32f1c30b93040515c7e4bfd5332714d86d3e64
-
Filesize
258KB
MD52d3b8ceab00c4b6f1a9d3e837e7c4a49
SHA11c20a92ffbbe7c63e65846a20b3b965d3a6725d3
SHA2567f12736f66fc280b8ce787bc7d68745293db96747f378f8e5803b6399aeccd93
SHA512fe755912741ddf5bf297572b44ec0839d4116265a128fa62d8fa35f75531b721a4ded4380dc786fa4c6afb659e8c2833f2ed6918e947d80ae5a8c22453f1bc34
-
Filesize
32KB
MD565c0578011febf82ac9ec095c3a46ede
SHA1a818b7457ddee7e421f1f2190b25ea20cd5ba61c
SHA256ec699a8e150bc13f40c35eafe568c1cc56ba609b35895776be731e4c5db34573
SHA512fa836d05a05c3b4e3b4a5b2179aa66ffd8144559715764ddb098ce96e3696f07c56f45a1f3525b855c532f3f3faf34ee9c7d82589ff7344e5321b0bc330e8b7a