Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
11/03/2025, 02:51
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe
Resource
win7-20250207-en
Behavioral task
behavioral2
Sample
JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe
-
Size
3.0MB
-
MD5
62c89b7d49c638c2a90186089fac7f35
-
SHA1
eaf5d3510f0e0643b093129e711e00e3044f49c9
-
SHA256
9f6288cce4bb1e115f6c787896108c8c4565a807ba4f660dcdbb1e5588c063db
-
SHA512
3ae1d2bc828e1b737567900122d3dda43d4815c3a2d4827aa3d6d46d317a014b10131e68e67cc367b9f37e96e78fe2f5d9d6a885ed1376cffff308e385655f56
-
SSDEEP
49152:bP8oDKyjpYE6z/A/dmcRdHxNWnHIvVGeFlf+xyiVXiDzG3:llFlfEyi023
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 12 IoCs
resource yara_rule behavioral1/memory/2504-17-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-13-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-29-0x00000000766D0000-0x00000000767E0000-memory.dmp family_blackshades behavioral1/memory/2504-104-0x00000000766D0000-0x00000000767E0000-memory.dmp family_blackshades behavioral1/memory/2504-106-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-107-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-109-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-110-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-111-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-114-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-117-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades behavioral1/memory/2504-123-0x0000000000400000-0x0000000000478000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\taskmgr.exe = "C:\\Users\\Admin\\AppData\\Roaming\\taskmgr.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Java(TM) Platform Auto Updater 2 0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3} taskmgr.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3} taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Active Setup\Installed Components\{8FF23DDD-E8D2-D81D-5CCE-FCAEAADEDCB3}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe -
Executes dropped EXE 4 IoCs
pid Process 2504 taskmgr.exe 2220 epicbot_520.exe 2736 epicbot_520.exe 1492 cookieman.exe -
Loads dropped DLL 4 IoCs
pid Process 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 2220 epicbot_520.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform Auto Updater 2 0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\Java(TM) Platform Auto Updater 2 0 = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\epicbot.exe" taskmgr.exe -
Checks whether UAC is enabled 1 TTPs 2 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA epicbot_520.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA epicbot_520.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1900 set thread context of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epicbot_520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language epicbot_520.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Internet Explorer\Main epicbot_520.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 2572 reg.exe 2588 reg.exe 2580 reg.exe 2624 reg.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2220 epicbot_520.exe 2220 epicbot_520.exe 2736 epicbot_520.exe 2736 epicbot_520.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2736 epicbot_520.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: 1 2504 taskmgr.exe Token: SeCreateTokenPrivilege 2504 taskmgr.exe Token: SeAssignPrimaryTokenPrivilege 2504 taskmgr.exe Token: SeLockMemoryPrivilege 2504 taskmgr.exe Token: SeIncreaseQuotaPrivilege 2504 taskmgr.exe Token: SeMachineAccountPrivilege 2504 taskmgr.exe Token: SeTcbPrivilege 2504 taskmgr.exe Token: SeSecurityPrivilege 2504 taskmgr.exe Token: SeTakeOwnershipPrivilege 2504 taskmgr.exe Token: SeLoadDriverPrivilege 2504 taskmgr.exe Token: SeSystemProfilePrivilege 2504 taskmgr.exe Token: SeSystemtimePrivilege 2504 taskmgr.exe Token: SeProfSingleProcessPrivilege 2504 taskmgr.exe Token: SeIncBasePriorityPrivilege 2504 taskmgr.exe Token: SeCreatePagefilePrivilege 2504 taskmgr.exe Token: SeCreatePermanentPrivilege 2504 taskmgr.exe Token: SeBackupPrivilege 2504 taskmgr.exe Token: SeRestorePrivilege 2504 taskmgr.exe Token: SeShutdownPrivilege 2504 taskmgr.exe Token: SeDebugPrivilege 2504 taskmgr.exe Token: SeAuditPrivilege 2504 taskmgr.exe Token: SeSystemEnvironmentPrivilege 2504 taskmgr.exe Token: SeChangeNotifyPrivilege 2504 taskmgr.exe Token: SeRemoteShutdownPrivilege 2504 taskmgr.exe Token: SeUndockPrivilege 2504 taskmgr.exe Token: SeSyncAgentPrivilege 2504 taskmgr.exe Token: SeEnableDelegationPrivilege 2504 taskmgr.exe Token: SeManageVolumePrivilege 2504 taskmgr.exe Token: SeImpersonatePrivilege 2504 taskmgr.exe Token: SeCreateGlobalPrivilege 2504 taskmgr.exe Token: 31 2504 taskmgr.exe Token: 32 2504 taskmgr.exe Token: 33 2504 taskmgr.exe Token: 34 2504 taskmgr.exe Token: 35 2504 taskmgr.exe Token: SeDebugPrivilege 2504 taskmgr.exe Token: SeIncreaseQuotaPrivilege 2736 epicbot_520.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2504 taskmgr.exe 2504 taskmgr.exe 2736 epicbot_520.exe 2736 epicbot_520.exe 2504 taskmgr.exe 2504 taskmgr.exe -
Suspicious use of WriteProcessMemory 54 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 1900 wrote to memory of 2504 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 28 PID 2504 wrote to memory of 1712 2504 taskmgr.exe 29 PID 2504 wrote to memory of 1712 2504 taskmgr.exe 29 PID 2504 wrote to memory of 1712 2504 taskmgr.exe 29 PID 2504 wrote to memory of 1712 2504 taskmgr.exe 29 PID 2504 wrote to memory of 1828 2504 taskmgr.exe 30 PID 2504 wrote to memory of 1828 2504 taskmgr.exe 30 PID 2504 wrote to memory of 1828 2504 taskmgr.exe 30 PID 2504 wrote to memory of 1828 2504 taskmgr.exe 30 PID 2504 wrote to memory of 1708 2504 taskmgr.exe 31 PID 2504 wrote to memory of 1708 2504 taskmgr.exe 31 PID 2504 wrote to memory of 1708 2504 taskmgr.exe 31 PID 2504 wrote to memory of 1708 2504 taskmgr.exe 31 PID 2504 wrote to memory of 2052 2504 taskmgr.exe 32 PID 2504 wrote to memory of 2052 2504 taskmgr.exe 32 PID 2504 wrote to memory of 2052 2504 taskmgr.exe 32 PID 2504 wrote to memory of 2052 2504 taskmgr.exe 32 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 1900 wrote to memory of 2220 1900 JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe 35 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2220 wrote to memory of 2736 2220 epicbot_520.exe 38 PID 2052 wrote to memory of 2624 2052 cmd.exe 39 PID 2052 wrote to memory of 2624 2052 cmd.exe 39 PID 2052 wrote to memory of 2624 2052 cmd.exe 39 PID 2052 wrote to memory of 2624 2052 cmd.exe 39 PID 1828 wrote to memory of 2572 1828 cmd.exe 40 PID 1828 wrote to memory of 2572 1828 cmd.exe 40 PID 1828 wrote to memory of 2572 1828 cmd.exe 40 PID 1828 wrote to memory of 2572 1828 cmd.exe 40 PID 1712 wrote to memory of 2580 1712 cmd.exe 41 PID 1712 wrote to memory of 2580 1712 cmd.exe 41 PID 1712 wrote to memory of 2580 1712 cmd.exe 41 PID 1712 wrote to memory of 2580 1712 cmd.exe 41 PID 1708 wrote to memory of 2588 1708 cmd.exe 42 PID 1708 wrote to memory of 2588 1708 cmd.exe 42 PID 1708 wrote to memory of 2588 1708 cmd.exe 42 PID 1708 wrote to memory of 2588 1708 cmd.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Roaming\taskmgr.exeC:\Users\Admin\AppData\Roaming\taskmgr.exe2⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2580
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\taskmgr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\taskmgr.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\taskmgr.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\taskmgr.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2572
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2588
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe:*:Enabled:Windows Messanger" /f3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\epicbot.exe:*:Enabled:Windows Messanger" /f4⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2624
-
-
-
-
C:\Users\Admin\AppData\Roaming\epicbot_520.exe"C:\Users\Admin\AppData\Roaming\epicbot_520.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Roaming\epicbot_520.exe"C:\Users\Admin\AppData\Roaming\epicbot_520.exe" /wrapper /dir="C:\Users\Admin\AppData\Local\Temp\pkg_233162420" /pproc="JaffaCakes118_62c89b7d49c638c2a90186089fac7f35.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\LocalLow\cookieman.exe"C:\Users\Admin\AppData\LocalLow\cookieman.exe" /mode=read installiq.com4⤵
- Executes dropped EXE
PID:1492
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Defense Evasion
Impair Defenses
1Disable or Modify System Firewall
1Modify Registry
6Credential Access
Credentials from Password Stores
1Credentials from Web Browsers
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
34B
MD53f4519b56cb1e006dfe4341e72112913
SHA10ff5675d359c898b6a6bdc1dff10f71097bc9927
SHA256125adf4924899f2026436c0919853bb78b718c7cb6f2187148b01938b79388a2
SHA51278c0961f0828f32032c643f0e6ab59d1ca8b96bb891a74b0b255e1a1a63a0c581f486e9e16b070399e6365d1fb53464eb2b723932480b41a2df5e9f1eb89ab40
-
Filesize
45KB
MD5e7abfa4ef85624e68a312ac0f8c7ab80
SHA1a6e5d5ce0e18f105b47f3fd3233ca7fc0617cef3
SHA2562a847efb0b92366bc794198254e3fe62ba2da42ff93bec5154879d89385bff4d
SHA5124dfc5e95f88d0241a2a3c3d42b6dc487c78cb185bed0ca559761721fa02e0fec83a5196df36dc5e95d0bc95ffc845a202d05acf5ff26d0a581eff5afe6b5d4e3
-
Filesize
114B
MD5c819368178ce1e40fd55c813340a597a
SHA181aef3fd883c52de4fe211f3e43f70137cbccdf6
SHA2561334449583ff7823df9ba97e57bed51eaaba21eed4551e25b07794f1d48c3e31
SHA512753ce58ed7b76de63f8d68bf95949dfd772e805d0ab514f2706d72b2d504fb53e9beadaed0d34d933fee4f98d3ea13172c8b3a0e391bcab639c3d70003ec71a7
-
Filesize
798B
MD51d45a29e3511b982a1f91b33c70e964f
SHA1176a47b489be3f27dc354a2b9dd0b580bb2f3904
SHA2560a69c29fe16727b18425df8ded1cfe9d07a380b9f23f1beb32f60fefc000b3dc
SHA512c574719f56a9cc0a3c393001f0774a5826afa5972906d9d9d214a183724a9f7226483a7181a0030e0f801b481a19957761efc170a10850aec786623eb939eb69
-
Filesize
1.6MB
MD513c33f8dfba6dce09cba47873cf07d3c
SHA1e9e548a5d17c1290a847845eeb4a49bc53e168d8
SHA256d6b10b87890447f58063be9674be7bb0beb65294c463400ef5c88e3fa9961a65
SHA51232ee4128f79528bf3862daad7ae6d7fde724e7ef3dea673670cf263091f29172871c6381c50828a93dacc6dc321b08571cdeae7cadb433b2476c6e08f56692d3
-
Filesize
3KB
MD5cd9f104ea953a4bce8c6383639b1c946
SHA1efbfbdeb0f2e291c3a7746ef5942712e82433942
SHA256966a92ff963438f7d3fcf1f048ad716eb5308d80ac01282f1cc4e24cba98edae
SHA51205063d2b5a53bb1ad0e2505a6add805d4742affa9a02c88b434a2809253eba9012fa981fa71c5cb61a758bbc529877b6465c75b9edcaece2e00a6f69f9e0b6e7