Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
17/03/2025, 13:42
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe
-
Size
346KB
-
MD5
7e3e9970e809be4c60529f14c838313e
-
SHA1
474f0f26deab4cee1652dac440ab6e7e3a8358a2
-
SHA256
9b004136e63dfe45c06aa3900d8e3c110ab54622573d233a344b53f6cdce4ace
-
SHA512
952a4d560417c14a39d92e5318fe8cee3331a68a02dfbdc57c08fedf5fb4c93305e32609784c7fe1b6891f7d5a502cfd333cd0a4cd5edbbb6297516062e70f3e
-
SSDEEP
6144:SS2TMoVaGR251kwfjNcweNbl+zb2dSllNFwXscphU+3:SSiMopR2LXiweNbHINcA6
Malware Config
Extracted
cybergate
v1.01.0
Cyber
ken1234.no-ip.info:82
Cerber
-
enable_keylogger
true
-
enable_message_box
false
-
ftp_directory
./logs/
-
ftp_interval
30
-
injected_process
explorer.exe
-
install_dir
Winbooterr
-
install_file
Dws.exe
-
install_flag
true
-
keylogger_enable_ftp
false
-
message_box_caption
Remote Administration anywhere in the world.
-
message_box_title
CyberGate
-
password
123456
-
regkey_hkcu
HKCU
-
regkey_hklm
HKLM
Signatures
-
Cybergate family
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Winbooterr\\Dws.exe" cfmon.exe Key created \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run cfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Policies = "C:\\Windows\\system32\\Winbooterr\\Dws.exe" cfmon.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 62 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe" explorer.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} explorer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q}\StubPath = "C:\\Windows\\system32\\Winbooterr\\Dws.exe Restart" cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{D6RH8C8Q-UPI4-62SG-68PE-5IYN05YV0F8Q} cfmon.exe -
Executes dropped EXE 59 IoCs
pid Process 2764 cfmon.exe 2176 Dws.exe 2984 cfmon.exe 1316 Dws.exe 2212 cfmon.exe 1752 Dws.exe 1280 cfmon.exe 1704 Dws.exe 1708 cfmon.exe 2208 Dws.exe 2848 cfmon.exe 2480 Dws.exe 888 cfmon.exe 1580 Dws.exe 2780 cfmon.exe 2932 Dws.exe 2584 cfmon.exe 2592 Dws.exe 2740 cfmon.exe 2244 Dws.exe 2596 cfmon.exe 1108 Dws.exe 912 cfmon.exe 2148 Dws.exe 2140 cfmon.exe 2444 Dws.exe 2448 cfmon.exe 2332 Dws.exe 804 cfmon.exe 2304 Dws.exe 2516 cfmon.exe 380 Dws.exe 536 cfmon.exe 1696 Dws.exe 2104 cfmon.exe 688 Dws.exe 752 cfmon.exe 1388 Dws.exe 1956 cfmon.exe 2488 Dws.exe 2032 cfmon.exe 608 Dws.exe 1064 cfmon.exe 1580 Dws.exe 2948 cfmon.exe 2856 Dws.exe 2636 cfmon.exe 2604 Dws.exe 2612 cfmon.exe 400 Dws.exe 2336 cfmon.exe 2148 Dws.exe 748 cfmon.exe 1472 Dws.exe 628 cfmon.exe 2332 Dws.exe 1136 cfmon.exe 788 Dws.exe 1948 cfmon.exe -
Loads dropped DLL 64 IoCs
pid Process 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 1596 explorer.exe 1596 explorer.exe 2176 Dws.exe 2176 Dws.exe 1596 explorer.exe 1596 explorer.exe 1316 Dws.exe 1316 Dws.exe 1596 explorer.exe 1596 explorer.exe 1752 Dws.exe 1752 Dws.exe 1596 explorer.exe 1596 explorer.exe 1704 Dws.exe 1704 Dws.exe 1596 explorer.exe 1596 explorer.exe 2208 Dws.exe 2208 Dws.exe 1596 explorer.exe 1596 explorer.exe 2480 Dws.exe 2480 Dws.exe 1596 explorer.exe 1596 explorer.exe 1580 Dws.exe 1580 Dws.exe 1596 explorer.exe 1596 explorer.exe 2932 Dws.exe 2932 Dws.exe 1596 explorer.exe 1596 explorer.exe 2592 Dws.exe 2592 Dws.exe 1596 explorer.exe 1596 explorer.exe 2244 Dws.exe 2244 Dws.exe 1596 explorer.exe 1596 explorer.exe 1108 Dws.exe 1108 Dws.exe 1596 explorer.exe 1596 explorer.exe 2148 Dws.exe 2148 Dws.exe 1596 explorer.exe 1596 explorer.exe 2444 Dws.exe 2444 Dws.exe 1596 explorer.exe 1596 explorer.exe 2332 Dws.exe 2332 Dws.exe 1596 explorer.exe 1596 explorer.exe 2304 Dws.exe 2304 Dws.exe 1596 explorer.exe 1596 explorer.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\Winbooterr\\Dws.exe" cfmon.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\Winbooterr\\Dws.exe" cfmon.exe -
Checks whether UAC is enabled 1 TTPs 30 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Dws.exe -
Drops file in System32 directory 60 IoCs
description ioc Process File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File created C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe File opened for modification C:\Windows\SysWOW64\Winbooterr\Dws.exe cfmon.exe -
Suspicious use of SetThreadContext 30 IoCs
description pid Process procid_target PID 2688 set thread context of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2176 set thread context of 2984 2176 Dws.exe 33 PID 1316 set thread context of 2212 1316 Dws.exe 35 PID 1752 set thread context of 1280 1752 Dws.exe 37 PID 1704 set thread context of 1708 1704 Dws.exe 39 PID 2208 set thread context of 2848 2208 Dws.exe 41 PID 2480 set thread context of 888 2480 Dws.exe 43 PID 1580 set thread context of 2780 1580 Dws.exe 45 PID 2932 set thread context of 2584 2932 Dws.exe 47 PID 2592 set thread context of 2740 2592 Dws.exe 49 PID 2244 set thread context of 2596 2244 Dws.exe 51 PID 1108 set thread context of 912 1108 Dws.exe 53 PID 2148 set thread context of 2140 2148 Dws.exe 55 PID 2444 set thread context of 2448 2444 Dws.exe 57 PID 2332 set thread context of 804 2332 Dws.exe 59 PID 2304 set thread context of 2516 2304 Dws.exe 61 PID 380 set thread context of 536 380 Dws.exe 63 PID 1696 set thread context of 2104 1696 Dws.exe 65 PID 688 set thread context of 752 688 Dws.exe 68 PID 1388 set thread context of 1956 1388 Dws.exe 70 PID 2488 set thread context of 2032 2488 Dws.exe 72 PID 608 set thread context of 1064 608 Dws.exe 74 PID 1580 set thread context of 2948 1580 Dws.exe 76 PID 2856 set thread context of 2636 2856 Dws.exe 78 PID 2604 set thread context of 2612 2604 Dws.exe 80 PID 400 set thread context of 2336 400 Dws.exe 82 PID 2148 set thread context of 748 2148 Dws.exe 84 PID 1472 set thread context of 628 1472 Dws.exe 86 PID 2332 set thread context of 1136 2332 Dws.exe 88 PID 788 set thread context of 1948 788 Dws.exe 90 -
resource yara_rule behavioral1/memory/2764-15-0x0000000024010000-0x0000000024070000-memory.dmp upx behavioral1/memory/1596-546-0x0000000024070000-0x00000000240D0000-memory.dmp upx behavioral1/memory/1596-562-0x0000000024070000-0x00000000240D0000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 32 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cfmon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Dws.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2984 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2764 cfmon.exe 2984 cfmon.exe 2984 cfmon.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2764 cfmon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2688 wrote to memory of 2764 2688 JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe 30 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21 PID 2764 wrote to memory of 1236 2764 cfmon.exe 21
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1236
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_7e3e9970e809be4c60529f14c838313e.exe"2⤵
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\explorer.exeexplorer.exe4⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2984
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2212
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:1280
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:1708
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2848
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:888
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2780
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2584
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2740
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2596
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:912
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2140
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2448
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:804
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2516
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:380 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:536
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2104
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:688 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:752
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:1956
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2032
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:608 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:1064
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2948
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2636
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2612
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:400 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:2336
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:748
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:628
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:1136
-
-
-
C:\Windows\SysWOW64\Winbooterr\Dws.exe"C:\Windows\system32\Winbooterr\Dws.exe"5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:788 -
C:\Users\Admin\AppData\Local\Temp\cfmon.exeC:\Users\Admin\AppData\Local\Temp\cfmon.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
PID:1948
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
227KB
MD5b3dd7cf27620eeb76f754f2d5ff8c0a8
SHA19d07c2055997dadd7e9d03690b911b5e3d276bc6
SHA256d96977a95385310b8706611a5874175c7a21af7412955c127f2ef0270c06337a
SHA512f24858a9d4a08286beab28c27021454c8ae30e9c323ef191e12697c67f49cbb9667a5ab9ce94d017e12f3d3cf48d1e0c25b546eb9be6604c0ecfa9fae46c9cb4
-
Filesize
346KB
MD57e3e9970e809be4c60529f14c838313e
SHA1474f0f26deab4cee1652dac440ab6e7e3a8358a2
SHA2569b004136e63dfe45c06aa3900d8e3c110ab54622573d233a344b53f6cdce4ace
SHA512952a4d560417c14a39d92e5318fe8cee3331a68a02dfbdc57c08fedf5fb4c93305e32609784c7fe1b6891f7d5a502cfd333cd0a4cd5edbbb6297516062e70f3e