Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10/03/2025, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe
-
Size
704KB
-
MD5
5da7fc78ba07bb5fa31e81d856c90094
-
SHA1
422f58e0fcc1b33fc91249f3f25bcdd14ccd4a88
-
SHA256
920fbbe5585057e032eaaedb3d92d6e663f4a1410ad83f0fef1544a83d182418
-
SHA512
938a96d993ed11ac6754b09bf4e3054d5f2d5808fc5f2154d98d396e6cbdb62014f2568e728f3a31caadb08e946ed1db739306ebc67fa77a310e4b1f6be86b56
-
SSDEEP
12288:lmmeIglT7m0jb37uJjpx8YwVfMZXmmW07XuE2aA3FUjmyWITFOYDLRh2zz2x5:lmnIOXpAjz8YkMcbWXv2rFUjOqFOYJB
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 13 IoCs
resource yara_rule behavioral1/memory/2800-27-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-34-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-23-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-55-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-56-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-57-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-59-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-61-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-62-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-63-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-69-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-70-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral1/memory/2800-71-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Auto Mouse Click.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Executes dropped EXE 2 IoCs
pid Process 2800 svchost.exe 2620 Setup.exe -
Loads dropped DLL 9 IoCs
pid Process 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 2620 Setup.exe 2620 Setup.exe 2620 Setup.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1316 set thread context of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry class 29 IoCs
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f4225481e03947bc34db131e946b44c8dd50000 Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewID = "{82BA0782-5B7A-4569-B5D7-EC83085F08CC}" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.amk\ = "AutoMouseClickFile" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell\open Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 9e0000001a00eebbfe23000010007db10d7bd29c934a973346cc89022e7c00002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020002a0000000000efbe7e47b3fbe4c93b4ba2bad3f5d3cd46f98207ba827a5b6945b5d7ec83085f08cc20002a0000000000efbe000000200000000000000000000000000000000000000000000000000100000020000000 Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_FolderType = "{FBB3477E-C9E4-4B3B-A2BA-D3F5D3CD46F9}" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.amk Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg\TV_TopViewVersion = "0" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\Setup.exe ,0" Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_Classes\Local Settings Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\Setup.exe \"%1\"" Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\DefaultIcon Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell\open\command Setup.exe Key created \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\ComDlg Setup.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1992 reg.exe 1556 reg.exe 1400 reg.exe 2084 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2620 Setup.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe Token: 1 2800 svchost.exe Token: SeCreateTokenPrivilege 2800 svchost.exe Token: SeAssignPrimaryTokenPrivilege 2800 svchost.exe Token: SeLockMemoryPrivilege 2800 svchost.exe Token: SeIncreaseQuotaPrivilege 2800 svchost.exe Token: SeMachineAccountPrivilege 2800 svchost.exe Token: SeTcbPrivilege 2800 svchost.exe Token: SeSecurityPrivilege 2800 svchost.exe Token: SeTakeOwnershipPrivilege 2800 svchost.exe Token: SeLoadDriverPrivilege 2800 svchost.exe Token: SeSystemProfilePrivilege 2800 svchost.exe Token: SeSystemtimePrivilege 2800 svchost.exe Token: SeProfSingleProcessPrivilege 2800 svchost.exe Token: SeIncBasePriorityPrivilege 2800 svchost.exe Token: SeCreatePagefilePrivilege 2800 svchost.exe Token: SeCreatePermanentPrivilege 2800 svchost.exe Token: SeBackupPrivilege 2800 svchost.exe Token: SeRestorePrivilege 2800 svchost.exe Token: SeShutdownPrivilege 2800 svchost.exe Token: SeDebugPrivilege 2800 svchost.exe Token: SeAuditPrivilege 2800 svchost.exe Token: SeSystemEnvironmentPrivilege 2800 svchost.exe Token: SeChangeNotifyPrivilege 2800 svchost.exe Token: SeRemoteShutdownPrivilege 2800 svchost.exe Token: SeUndockPrivilege 2800 svchost.exe Token: SeSyncAgentPrivilege 2800 svchost.exe Token: SeEnableDelegationPrivilege 2800 svchost.exe Token: SeManageVolumePrivilege 2800 svchost.exe Token: SeImpersonatePrivilege 2800 svchost.exe Token: SeCreateGlobalPrivilege 2800 svchost.exe Token: 31 2800 svchost.exe Token: 32 2800 svchost.exe Token: 33 2800 svchost.exe Token: 34 2800 svchost.exe Token: 35 2800 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2800 svchost.exe 2800 svchost.exe 2620 Setup.exe 2620 Setup.exe 2620 Setup.exe 2800 svchost.exe -
Suspicious use of WriteProcessMemory 47 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2800 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 30 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 1316 wrote to memory of 2620 1316 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 31 PID 2800 wrote to memory of 2832 2800 svchost.exe 32 PID 2800 wrote to memory of 2832 2800 svchost.exe 32 PID 2800 wrote to memory of 2832 2800 svchost.exe 32 PID 2800 wrote to memory of 2832 2800 svchost.exe 32 PID 2800 wrote to memory of 2664 2800 svchost.exe 33 PID 2800 wrote to memory of 2664 2800 svchost.exe 33 PID 2800 wrote to memory of 2664 2800 svchost.exe 33 PID 2800 wrote to memory of 2664 2800 svchost.exe 33 PID 2800 wrote to memory of 2888 2800 svchost.exe 35 PID 2800 wrote to memory of 2888 2800 svchost.exe 35 PID 2800 wrote to memory of 2888 2800 svchost.exe 35 PID 2800 wrote to memory of 2888 2800 svchost.exe 35 PID 2832 wrote to memory of 1992 2832 cmd.exe 40 PID 2832 wrote to memory of 1992 2832 cmd.exe 40 PID 2832 wrote to memory of 1992 2832 cmd.exe 40 PID 2832 wrote to memory of 1992 2832 cmd.exe 40 PID 2664 wrote to memory of 1556 2664 cmd.exe 39 PID 2664 wrote to memory of 1556 2664 cmd.exe 39 PID 2664 wrote to memory of 1556 2664 cmd.exe 39 PID 2664 wrote to memory of 1556 2664 cmd.exe 39 PID 2800 wrote to memory of 2368 2800 svchost.exe 38 PID 2800 wrote to memory of 2368 2800 svchost.exe 38 PID 2800 wrote to memory of 2368 2800 svchost.exe 38 PID 2800 wrote to memory of 2368 2800 svchost.exe 38 PID 2888 wrote to memory of 1400 2888 cmd.exe 42 PID 2888 wrote to memory of 1400 2888 cmd.exe 42 PID 2888 wrote to memory of 1400 2888 cmd.exe 42 PID 2888 wrote to memory of 1400 2888 cmd.exe 42 PID 2368 wrote to memory of 2084 2368 cmd.exe 43 PID 2368 wrote to memory of 2084 2368 cmd.exe 43 PID 2368 wrote to memory of 2084 2368 cmd.exe 43 PID 2368 wrote to memory of 2084 2368 cmd.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1992
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1556
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1400
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2084
-
-
-
-
C:\Users\Admin\AppData\Roaming\Setup.exe"C:\Users\Admin\AppData\Roaming\Setup.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
16KB
MD5a44955546884bc8a0db6bd7a2857fc85
SHA11fd4b0504894caeab55626e6d348441c17b01868
SHA25615a841748f3af0b6f78c8fadcb1cc942d938a0785d97456458df3721364b126c
SHA51274ea61dc09e44f40ee2e3a43a79b23436e4853e790902d0ac1c46a01084e22d25f3f3b8e67f8d30c055e9e167b3fd8ff6e8b3d5983832e9da010b5424f8eb440
-
Filesize
15KB
MD58d0a509b3ff7eb2945424f5f11474a0f
SHA1a781cda1d9225095bbfcf7198d932146df6ab83a
SHA25665c7dd8f275c90f5c65ac207c11735868b15a27ab6d692f2169af38b2672db4e
SHA512d76c4718a890cadbc03fac07d8c31703645cac70be51250198f4ee83189addbe27252a5553100911d2d591440cf5bd54e075264e78609df864bf92bf334d0c3b
-
Filesize
44KB
MD5ffc3cf2f6b6ed7f7828b5f543b2ac6c0
SHA18b1fc7d5215d460c23b0aebf815a8da3916dcbea
SHA25649c21fd6414e34d6b2a2e73e6288b942bddaf873919a2ee90ac52d21f372b5b9
SHA5125eeffa259ef012a953c290171b3ab74e4f3399ccd2ebdb0cac4ca0159a67d6f60e2dcafb46ee33b1ef84f647f3dc782a20361a79dc08a240b6cf22edc2da1e79