Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250217-en -
resource tags
arch:x64arch:x86image:win10v2004-20250217-enlocale:en-usos:windows10-2004-x64system -
submitted
10/03/2025, 14:06
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe
-
Size
394KB
-
MD5
5f924d92586b8eb49f011ae82cab97f3
-
SHA1
ada22c58894b3145c9db412cf7517ca05191da0a
-
SHA256
dd375464fdc46dae5d4bf40596ed7ebd41b31562539e9fa82cd66956f1d9f439
-
SHA512
70f6972ac65a6ec3ecfed55fc43125dc49090ee1d95c0f0a7ebe1402652b6ceaf7bfa7e52e177fae14427cb191b0c37832bd6979eb9bfa42f112b512f67939d9
-
SSDEEP
6144:uH98Nzy4+OFz42jwznGtT3NcuRxTzKccEldZp2GvDznVW5GJZ2tNYLj8Mfsn5BzS:26ZPB4FzI2mTWcHdZpZ3VzYKj86s51S
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 15 IoCs
resource yara_rule behavioral2/memory/988-50-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-56-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-57-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-58-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-60-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-61-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-62-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-64-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-65-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-66-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-69-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-70-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-72-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-73-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades behavioral2/memory/988-74-0x0000000000400000-0x000000000045D000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe:*:Enabled:Windows Messanger" reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\KH47B897HL.exe = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E} JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E} JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{BC94B5FB-CAFE-EFFC-4A2C-CDDAECD2BA2E}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Set value (str) \REGISTRY\USER\S-1-5-21-925314154-1797147466-1467878628-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Defender = "C:\\Users\\Admin\\AppData\\Roaming\\KH47B897HL.exe" JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2008 set thread context of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 -
resource yara_rule behavioral2/memory/988-45-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-49-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-50-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-56-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-57-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-58-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-60-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-61-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-62-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-64-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-65-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-66-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-69-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-70-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-72-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-73-0x0000000000400000-0x000000000045D000-memory.dmp upx behavioral2/memory/988-74-0x0000000000400000-0x000000000045D000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 10 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 3 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2668 reg.exe 4516 reg.exe 2732 reg.exe 212 reg.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Suspicious use of AdjustPrivilegeToken 35 IoCs
description pid Process Token: 1 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeCreateTokenPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeAssignPrimaryTokenPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeLockMemoryPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeIncreaseQuotaPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeMachineAccountPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeTcbPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeSecurityPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeTakeOwnershipPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeLoadDriverPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeSystemProfilePrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeSystemtimePrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeProfSingleProcessPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeIncBasePriorityPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeCreatePagefilePrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeCreatePermanentPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeBackupPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeRestorePrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeShutdownPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeDebugPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeAuditPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeSystemEnvironmentPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeChangeNotifyPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeRemoteShutdownPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeUndockPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeSyncAgentPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeEnableDelegationPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeManageVolumePrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeImpersonatePrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: SeCreateGlobalPrivilege 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: 31 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: 32 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: 33 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: 34 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe Token: 35 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 2008 wrote to memory of 988 2008 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 87 PID 988 wrote to memory of 3068 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 88 PID 988 wrote to memory of 3068 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 88 PID 988 wrote to memory of 3068 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 88 PID 988 wrote to memory of 1932 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 89 PID 988 wrote to memory of 1932 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 89 PID 988 wrote to memory of 1932 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 89 PID 988 wrote to memory of 3588 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 90 PID 988 wrote to memory of 3588 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 90 PID 988 wrote to memory of 3588 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 90 PID 988 wrote to memory of 756 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 91 PID 988 wrote to memory of 756 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 91 PID 988 wrote to memory of 756 988 JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe 91 PID 1932 wrote to memory of 2668 1932 cmd.exe 96 PID 1932 wrote to memory of 2668 1932 cmd.exe 96 PID 1932 wrote to memory of 2668 1932 cmd.exe 96 PID 3068 wrote to memory of 4516 3068 cmd.exe 97 PID 3068 wrote to memory of 4516 3068 cmd.exe 97 PID 3068 wrote to memory of 4516 3068 cmd.exe 97 PID 3588 wrote to memory of 212 3588 cmd.exe 98 PID 3588 wrote to memory of 212 3588 cmd.exe 98 PID 3588 wrote to memory of 212 3588 cmd.exe 98 PID 756 wrote to memory of 2732 756 cmd.exe 99 PID 756 wrote to memory of 2732 756 cmd.exe 99 PID 756 wrote to memory of 2732 756 cmd.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe"2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4516
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_5f924d92586b8eb49f011ae82cab97f3.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2668
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:212
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\KH47B897HL.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2732
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1