Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
147s -
max time network
140s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
12/03/2025, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe
Resource
win10v2004-20250217-en
General
-
Target
JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe
-
Size
564KB
-
MD5
69e797dba4c07425a90daffaf48dec7a
-
SHA1
bb58bfff7053e6399cbb0c14e95b5597429bd0d6
-
SHA256
bbb195a391d945cf70d1ac0b623df8f9828f32ace32ccf5c119fc839d0422354
-
SHA512
a3b0a3940d27bb2390c701562de3883e034b5b3fff2c9ca3292291f9e52b338d7b8a6eee561a2e2b2c712fc1eb98b7da232163379a0ffa59febcd3f80ef95f03
-
SSDEEP
6144:6dnNVPx5eSTlJjc/UyUfVbeY1yPkdFNjwlQ6o0ePt+5UBBfg6+ZD/NsPUtFJ8I//:unPPxLj9bJq6rLg5UBBfgVr2PUtzDGh
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 17 IoCs
resource yara_rule behavioral1/memory/2728-25-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-21-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-38-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-39-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-40-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-41-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-44-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-45-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-46-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-48-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-49-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-50-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-52-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-53-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-54-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-57-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades behavioral1/memory/2728-58-0x0000000000400000-0x000000000046E000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 8 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\Windows (TM) Updates\k.exe = "C:\\Users\\Admin\\AppData\\Roaming\\Windows (TM) Updates\\k.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe:*:Enabled:Windows Messanger" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\google update = "C:\\Users\\Admin\\AppData\\Roaming\\Windows (TM) Updates\\k.exe" JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\google update = "C:\\Users\\Admin\\AppData\\Roaming\\Windows (TM) Updates\\k.exe" JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\google update = "C:\\Users\\Admin\\AppData\\Roaming\\Windows (TM) Updates\\k.exe" JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2664 set thread context of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2776 set thread context of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 11 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 1852 reg.exe 564 reg.exe 576 reg.exe 1396 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeCreateTokenPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeAssignPrimaryTokenPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeLockMemoryPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeIncreaseQuotaPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeMachineAccountPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeTcbPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeSecurityPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeTakeOwnershipPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeLoadDriverPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeSystemProfilePrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeSystemtimePrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeProfSingleProcessPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeIncBasePriorityPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeCreatePagefilePrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeCreatePermanentPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeBackupPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeRestorePrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeShutdownPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeDebugPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeAuditPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeSystemEnvironmentPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeChangeNotifyPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeRemoteShutdownPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeUndockPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeSyncAgentPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeEnableDelegationPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeManageVolumePrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeImpersonatePrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeCreateGlobalPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: 31 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: 32 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: 33 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: 34 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: 35 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe Token: SeDebugPrivilege 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe -
Suspicious use of SetWindowsHookEx 5 IoCs
pid Process 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2664 wrote to memory of 2776 2664 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 31 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2776 wrote to memory of 2728 2776 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 32 PID 2728 wrote to memory of 2820 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 33 PID 2728 wrote to memory of 2820 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 33 PID 2728 wrote to memory of 2820 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 33 PID 2728 wrote to memory of 2820 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 33 PID 2728 wrote to memory of 2528 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 34 PID 2728 wrote to memory of 2528 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 34 PID 2728 wrote to memory of 2528 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 34 PID 2728 wrote to memory of 2528 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 34 PID 2728 wrote to memory of 2556 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 36 PID 2728 wrote to memory of 2556 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 36 PID 2728 wrote to memory of 2556 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 36 PID 2728 wrote to memory of 2556 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 36 PID 2728 wrote to memory of 2576 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 37 PID 2728 wrote to memory of 2576 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 37 PID 2728 wrote to memory of 2576 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 37 PID 2728 wrote to memory of 2576 2728 JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe 37 PID 2556 wrote to memory of 1396 2556 cmd.exe 41 PID 2556 wrote to memory of 1396 2556 cmd.exe 41 PID 2556 wrote to memory of 1396 2556 cmd.exe 41 PID 2556 wrote to memory of 1396 2556 cmd.exe 41 PID 2576 wrote to memory of 1852 2576 cmd.exe 42 PID 2576 wrote to memory of 1852 2576 cmd.exe 42 PID 2576 wrote to memory of 1852 2576 cmd.exe 42 PID 2576 wrote to memory of 1852 2576 cmd.exe 42 PID 2528 wrote to memory of 564 2528 cmd.exe 43 PID 2528 wrote to memory of 564 2528 cmd.exe 43 PID 2528 wrote to memory of 564 2528 cmd.exe 43 PID 2528 wrote to memory of 564 2528 cmd.exe 43 PID 2820 wrote to memory of 576 2820 cmd.exe 44 PID 2820 wrote to memory of 576 2820 cmd.exe 44 PID 2820 wrote to memory of 576 2820 cmd.exe 44 PID 2820 wrote to memory of 576 2820 cmd.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe"2⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe"3⤵
- Adds policy Run key to start application
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:576
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_69e797dba4c07425a90daffaf48dec7a.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:564
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1396
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows (TM) Updates\k.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows (TM) Updates\k.exe:*:Enabled:Windows Messanger" /f4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\Windows (TM) Updates\k.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Windows (TM) Updates\k.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:1852
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1