Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 06:49
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe
-
Size
704KB
-
MD5
5da7fc78ba07bb5fa31e81d856c90094
-
SHA1
422f58e0fcc1b33fc91249f3f25bcdd14ccd4a88
-
SHA256
920fbbe5585057e032eaaedb3d92d6e663f4a1410ad83f0fef1544a83d182418
-
SHA512
938a96d993ed11ac6754b09bf4e3054d5f2d5808fc5f2154d98d396e6cbdb62014f2568e728f3a31caadb08e946ed1db739306ebc67fa77a310e4b1f6be86b56
-
SSDEEP
12288:lmmeIglT7m0jb37uJjpx8YwVfMZXmmW07XuE2aA3FUjmyWITFOYDLRh2zz2x5:lmnIOXpAjz8YkMcbWXv2rFUjOqFOYJB
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 13 IoCs
resource yara_rule behavioral2/memory/3328-16-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-20-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-43-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-44-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-45-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-47-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-48-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-49-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-51-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-53-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-57-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-58-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades behavioral2/memory/3328-61-0x0000000000400000-0x0000000000470000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Auto Mouse Click.exe:*:Enabled:Windows Messanger" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000\Control Panel\International\Geo\Nation JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Executes dropped EXE 2 IoCs
pid Process 3328 svchost.exe 1972 Setup.exe -
Loads dropped DLL 4 IoCs
pid Process 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3660 set thread context of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Setup.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Modifies registry class 29 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.amk Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell\open Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\DefaultIcon Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell\open\command Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\WOW6432Node\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.amk\ = "AutoMouseClickFile" Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Roaming\\Setup.exe ,0" Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 Setup.exe Set value (int) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\MRUListEx = ffffffff Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1 Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\MRUListEx = 00000000ffffffff Setup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Roaming\\Setup.exe \"%1\"" Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 = 14001f50e04fd020ea3a6910a2d808002b30309d0000 Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell Setup.exe Set value (str) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Setup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\AutoMouseClickFile\shell Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 Setup.exe Set value (data) \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Setup.exe Key created \REGISTRY\USER\S-1-5-21-22591836-1183090055-1220658180-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 Setup.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4700 reg.exe 4500 reg.exe 2704 reg.exe 2072 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: SeDebugPrivilege 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe Token: 1 3328 svchost.exe Token: SeCreateTokenPrivilege 3328 svchost.exe Token: SeAssignPrimaryTokenPrivilege 3328 svchost.exe Token: SeLockMemoryPrivilege 3328 svchost.exe Token: SeIncreaseQuotaPrivilege 3328 svchost.exe Token: SeMachineAccountPrivilege 3328 svchost.exe Token: SeTcbPrivilege 3328 svchost.exe Token: SeSecurityPrivilege 3328 svchost.exe Token: SeTakeOwnershipPrivilege 3328 svchost.exe Token: SeLoadDriverPrivilege 3328 svchost.exe Token: SeSystemProfilePrivilege 3328 svchost.exe Token: SeSystemtimePrivilege 3328 svchost.exe Token: SeProfSingleProcessPrivilege 3328 svchost.exe Token: SeIncBasePriorityPrivilege 3328 svchost.exe Token: SeCreatePagefilePrivilege 3328 svchost.exe Token: SeCreatePermanentPrivilege 3328 svchost.exe Token: SeBackupPrivilege 3328 svchost.exe Token: SeRestorePrivilege 3328 svchost.exe Token: SeShutdownPrivilege 3328 svchost.exe Token: SeDebugPrivilege 3328 svchost.exe Token: SeAuditPrivilege 3328 svchost.exe Token: SeSystemEnvironmentPrivilege 3328 svchost.exe Token: SeChangeNotifyPrivilege 3328 svchost.exe Token: SeRemoteShutdownPrivilege 3328 svchost.exe Token: SeUndockPrivilege 3328 svchost.exe Token: SeSyncAgentPrivilege 3328 svchost.exe Token: SeEnableDelegationPrivilege 3328 svchost.exe Token: SeManageVolumePrivilege 3328 svchost.exe Token: SeImpersonatePrivilege 3328 svchost.exe Token: SeCreateGlobalPrivilege 3328 svchost.exe Token: 31 3328 svchost.exe Token: 32 3328 svchost.exe Token: 33 3328 svchost.exe Token: 34 3328 svchost.exe Token: 35 3328 svchost.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3328 svchost.exe 3328 svchost.exe 1972 Setup.exe 1972 Setup.exe 1972 Setup.exe 3328 svchost.exe -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 3328 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 88 PID 3660 wrote to memory of 1972 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 89 PID 3660 wrote to memory of 1972 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 89 PID 3660 wrote to memory of 1972 3660 JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe 89 PID 3328 wrote to memory of 3128 3328 svchost.exe 96 PID 3328 wrote to memory of 3128 3328 svchost.exe 96 PID 3328 wrote to memory of 3128 3328 svchost.exe 96 PID 3328 wrote to memory of 4772 3328 svchost.exe 97 PID 3328 wrote to memory of 4772 3328 svchost.exe 97 PID 3328 wrote to memory of 4772 3328 svchost.exe 97 PID 3328 wrote to memory of 4064 3328 svchost.exe 98 PID 3328 wrote to memory of 4064 3328 svchost.exe 98 PID 3328 wrote to memory of 4064 3328 svchost.exe 98 PID 3328 wrote to memory of 3764 3328 svchost.exe 99 PID 3328 wrote to memory of 3764 3328 svchost.exe 99 PID 3328 wrote to memory of 3764 3328 svchost.exe 99 PID 4064 wrote to memory of 4500 4064 cmd.exe 105 PID 4064 wrote to memory of 4500 4064 cmd.exe 105 PID 4064 wrote to memory of 4500 4064 cmd.exe 105 PID 3764 wrote to memory of 2704 3764 cmd.exe 106 PID 3764 wrote to memory of 2704 3764 cmd.exe 106 PID 3764 wrote to memory of 2704 3764 cmd.exe 106 PID 4772 wrote to memory of 2072 4772 cmd.exe 107 PID 4772 wrote to memory of 2072 4772 cmd.exe 107 PID 4772 wrote to memory of 2072 4772 cmd.exe 107 PID 3128 wrote to memory of 4700 3128 cmd.exe 108 PID 3128 wrote to memory of 4700 3128 cmd.exe 108 PID 3128 wrote to memory of 4700 3128 cmd.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5da7fc78ba07bb5fa31e81d856c90094.exe"1⤵
- Checks computer location settings
- Drops startup file
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3328 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3128 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4700
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4772 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2072
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4064 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4500
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3764 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Auto Mouse Click.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2704
-
-
-
-
C:\Users\Admin\AppData\Roaming\Setup.exe"C:\Users\Admin\AppData\Roaming\Setup.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:1972
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
15KB
MD58d0a509b3ff7eb2945424f5f11474a0f
SHA1a781cda1d9225095bbfcf7198d932146df6ab83a
SHA25665c7dd8f275c90f5c65ac207c11735868b15a27ab6d692f2169af38b2672db4e
SHA512d76c4718a890cadbc03fac07d8c31703645cac70be51250198f4ee83189addbe27252a5553100911d2d591440cf5bd54e075264e78609df864bf92bf334d0c3b
-
Filesize
44KB
MD5ffc3cf2f6b6ed7f7828b5f543b2ac6c0
SHA18b1fc7d5215d460c23b0aebf815a8da3916dcbea
SHA25649c21fd6414e34d6b2a2e73e6288b942bddaf873919a2ee90ac52d21f372b5b9
SHA5125eeffa259ef012a953c290171b3ab74e4f3399ccd2ebdb0cac4ca0159a67d6f60e2dcafb46ee33b1ef84f647f3dc782a20361a79dc08a240b6cf22edc2da1e79
-
Filesize
16KB
MD5a44955546884bc8a0db6bd7a2857fc85
SHA11fd4b0504894caeab55626e6d348441c17b01868
SHA25615a841748f3af0b6f78c8fadcb1cc942d938a0785d97456458df3721364b126c
SHA51274ea61dc09e44f40ee2e3a43a79b23436e4853e790902d0ac1c46a01084e22d25f3f3b8e67f8d30c055e9e167b3fd8ff6e8b3d5983832e9da010b5424f8eb440