Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 04:15
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe
-
Size
232KB
-
MD5
5d020f63e6132f6cc5d648c1320b35fd
-
SHA1
ab94a4264221665fcd4838a5025f39bdd3983ab6
-
SHA256
9218caaf75357ca9de019d2992d1cfa4434f7fc5b5a31c6d1994246cc1260acd
-
SHA512
d8e1ff5a43a465127e40576e94e07634732cd53d876642474d42949aa358de9b37b554ae5828b8f6e6c30fb17c7dfdcec2528a2d2781bbaea782c7560c84f9e5
-
SSDEEP
3072:uFizYn1ySqkABILn38irWzR0wvJB0vDSZF9fqwRlpfK/88CjaIIPjW5niFx5qWY:qQFq8oe+wvL0vqKwRHK6+ImjF
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 16 IoCs
resource yara_rule behavioral2/memory/4720-26-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-29-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-33-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-32-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-31-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-40-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-41-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-45-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-49-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-52-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-55-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-59-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-62-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-72-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-75-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral2/memory/4720-79-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\WinDefender.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31} svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{6BC8DD1A-C63F-FC4D-BDEF-1E0BBFD98D31}\StubPath = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4720 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Local\\Temp\\WinDefender.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4008 set thread context of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 -
resource yara_rule behavioral2/memory/4720-25-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-21-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-26-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-29-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-33-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-32-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-31-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-40-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-41-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-45-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-49-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-52-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-55-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-59-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-62-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-72-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-75-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral2/memory/4720-79-0x0000000000400000-0x000000000045C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language csc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cvtres.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2336 reg.exe 2984 reg.exe 3232 reg.exe 3936 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe Token: 1 4720 svchost.exe Token: SeCreateTokenPrivilege 4720 svchost.exe Token: SeAssignPrimaryTokenPrivilege 4720 svchost.exe Token: SeLockMemoryPrivilege 4720 svchost.exe Token: SeIncreaseQuotaPrivilege 4720 svchost.exe Token: SeMachineAccountPrivilege 4720 svchost.exe Token: SeTcbPrivilege 4720 svchost.exe Token: SeSecurityPrivilege 4720 svchost.exe Token: SeTakeOwnershipPrivilege 4720 svchost.exe Token: SeLoadDriverPrivilege 4720 svchost.exe Token: SeSystemProfilePrivilege 4720 svchost.exe Token: SeSystemtimePrivilege 4720 svchost.exe Token: SeProfSingleProcessPrivilege 4720 svchost.exe Token: SeIncBasePriorityPrivilege 4720 svchost.exe Token: SeCreatePagefilePrivilege 4720 svchost.exe Token: SeCreatePermanentPrivilege 4720 svchost.exe Token: SeBackupPrivilege 4720 svchost.exe Token: SeRestorePrivilege 4720 svchost.exe Token: SeShutdownPrivilege 4720 svchost.exe Token: SeDebugPrivilege 4720 svchost.exe Token: SeAuditPrivilege 4720 svchost.exe Token: SeSystemEnvironmentPrivilege 4720 svchost.exe Token: SeChangeNotifyPrivilege 4720 svchost.exe Token: SeRemoteShutdownPrivilege 4720 svchost.exe Token: SeUndockPrivilege 4720 svchost.exe Token: SeSyncAgentPrivilege 4720 svchost.exe Token: SeEnableDelegationPrivilege 4720 svchost.exe Token: SeManageVolumePrivilege 4720 svchost.exe Token: SeImpersonatePrivilege 4720 svchost.exe Token: SeCreateGlobalPrivilege 4720 svchost.exe Token: 31 4720 svchost.exe Token: 32 4720 svchost.exe Token: 33 4720 svchost.exe Token: 34 4720 svchost.exe Token: 35 4720 svchost.exe Token: SeDebugPrivilege 4720 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4720 svchost.exe 4720 svchost.exe 4720 svchost.exe -
Suspicious use of WriteProcessMemory 38 IoCs
description pid Process procid_target PID 4008 wrote to memory of 1148 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 89 PID 4008 wrote to memory of 1148 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 89 PID 4008 wrote to memory of 1148 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 89 PID 1148 wrote to memory of 3756 1148 csc.exe 92 PID 1148 wrote to memory of 3756 1148 csc.exe 92 PID 1148 wrote to memory of 3756 1148 csc.exe 92 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4008 wrote to memory of 4720 4008 JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe 93 PID 4720 wrote to memory of 2860 4720 svchost.exe 94 PID 4720 wrote to memory of 2860 4720 svchost.exe 94 PID 4720 wrote to memory of 2860 4720 svchost.exe 94 PID 4720 wrote to memory of 1196 4720 svchost.exe 95 PID 4720 wrote to memory of 1196 4720 svchost.exe 95 PID 4720 wrote to memory of 1196 4720 svchost.exe 95 PID 4720 wrote to memory of 1652 4720 svchost.exe 96 PID 4720 wrote to memory of 1652 4720 svchost.exe 96 PID 4720 wrote to memory of 1652 4720 svchost.exe 96 PID 4720 wrote to memory of 3092 4720 svchost.exe 97 PID 4720 wrote to memory of 3092 4720 svchost.exe 97 PID 4720 wrote to memory of 3092 4720 svchost.exe 97 PID 3092 wrote to memory of 2984 3092 cmd.exe 102 PID 3092 wrote to memory of 2984 3092 cmd.exe 102 PID 3092 wrote to memory of 2984 3092 cmd.exe 102 PID 2860 wrote to memory of 3232 2860 cmd.exe 103 PID 2860 wrote to memory of 3232 2860 cmd.exe 103 PID 2860 wrote to memory of 3232 2860 cmd.exe 103 PID 1652 wrote to memory of 3936 1652 cmd.exe 104 PID 1652 wrote to memory of 3936 1652 cmd.exe 104 PID 1652 wrote to memory of 3936 1652 cmd.exe 104 PID 1196 wrote to memory of 2336 1196 cmd.exe 105 PID 1196 wrote to memory of 2336 1196 cmd.exe 105 PID 1196 wrote to memory of 2336 1196 cmd.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5d020f63e6132f6cc5d648c1320b35fd.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\w-psm9rt.cmdline"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exeC:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES802D.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC802C.tmp"3⤵
- System Location Discovery: System Language Discovery
PID:3756
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3232
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2336
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:3936
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\WinDefender.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2984
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD51f1413cbc8273297965927d78332314d
SHA1fc58d8faf60d5ad88cb1586c0fa7cc9b85483f15
SHA256e00815861701c71028c92805a940279c30ce67abeb7f1aed5f6248c0bd5f2fcf
SHA51292e09d0cb8c7fbdbebc186ac15dd7b8777cb8cdb347c3c42e308d39300509e2db67728de4fe72f1cdea136c5ec134b5b9febb151aeead8affded711eb1dc320f
-
Filesize
5KB
MD583e7f3c9e3c730af55b458628735d89d
SHA108bb0e38eb9148eff7107a498e574c988a3590bc
SHA256e064e76ec5137539ab1debb915308bd063ad0dbe985d7ce7f48f0003bffb0d92
SHA5122d84d479f53ebbd89efc2b5d89c49e0bdd5ab41e8743a114d31e300c54121f709a1b2ee63674ec61f816d36c0bd007af3a159a1172c07386a2dc0d63e8d200ea
-
Filesize
12KB
MD5bb5b2961567e68995464801d3bb2a964
SHA15d82ae2b8d24208418bfb09cbb3074c056e790dc
SHA256a2d3d892c68a84208a9887cb34ecae820e59c4aa25c22db5c23379df344df004
SHA512050550640a7bf2b65b3cd537f252b64465ec451555ff1831a9d799922e8c3382e83a52bc46015c5ed1ac79ebb233616f72aa8ed72f01e8be578ca383a304ff7a
-
Filesize
652B
MD50e241a551cac5afc675674579deb79db
SHA1de2c8c4399a8f3ddd5a01861ce65ce488f7f1e0b
SHA256ec52ca586aa40c7a3bf82063f2bfa70fc19ebf49995441443d2a5e4d96304416
SHA5126bacd61e0f8723104c691ffc4932993bda9b4b09a3fd0b970e7ee20079db4eb2855e58c0b9122f8ed818aab87892da66330d5c82c80663d061e2767790de333b
-
Filesize
4KB
MD52216d197bc442e875016eba15c07a937
SHA137528e21ea3271b85d276c6bd003e6c60c81545d
SHA2562e9e3da7bfa1334706550bb4d6269bf3e64cbbc09fa349af52eb22f32aebb4af
SHA5127d7bdc3bf83ac0a29e917ead899dcaa1b47ee2660f405fe4883ca2a2546f7924265e1d75a2ea02c0e34fac4d2bb82bbaaa88d06c240afad4e9fd49337cd04d3f
-
Filesize
206B
MD501f4c39094f19eb7fbc5500253b3c163
SHA163e1b036befd5e149689d8fbbf21ebdda6e20362
SHA256e3f1760f05ff31f4e6cc53702b1519cb48627d90c044d84adc2f5f5482e3bcb8
SHA512933bdac0c3499f6336779270514341c8900047df28c2905a1a28a530e67d709909ebad98147204da5d5cbc1b993d7f511439872ed087c5a67007d7fcb0d8faf9