Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20250314-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/03/2025, 15:31

General

  • Target

    JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe

  • Size

    938KB

  • MD5

    83c698151d075740628ae7d8aaf39023

  • SHA1

    f4725174c66a837870f74222b7cc4fa19160731b

  • SHA256

    1d34ccc414f59436188e5c8a29963e16b0913b1f148c4f51eafe6ae23176ea55

  • SHA512

    7a970cc742bb5103c4b7296b6f9ac11ee3870be5a8bebba75ebd2d7a0403dacbf5723b3e13bdd7dd40d628c00678feaf5f86b2a5cbe3d947cbcd23c3fa5bb04d

  • SSDEEP

    24576:2FTqADbP4qXsZejCxQZPUQz/neABpcIssX0viImQG:ETvgqcZnQRUQbeAvcIhGi

Malware Config

Extracted

Family

darkcomet

Botnet

Tonkman

C2

iiili.in:5300

iiili.in:5310

iiili.in:5320

iiili.in:5330

iiili.in:5340

iiili.in:5350

iiili.in:5360

iiili.in:5370

iiili.in:5380

iiili.in:5390

illiil.in:5300

illiil.in:5310

illiil.in:5320

illiil.in:5330

illiil.in:5340

illiil.in:5350

illiil.in:5360

illiil.in:5370

illiil.in:5380

illiil.in:5390

Mutex

BugTestingReporter

Attributes
  • gencode

    5d7taAMln2CM

  • install

    false

  • offline_keylogger

    true

  • persistence

    false

rc4.plain

Signatures

  • Darkcomet

    DarkComet is a remote access trojan (RAT) developed by Jean-Pierre Lesueur.

  • Darkcomet family
  • Modifies firewall policy service 3 TTPs 2 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • Modifies Windows Firewall 2 TTPs 6 IoCs
  • Sets file to hidden 1 TTPs 11 IoCs

    Modifies file attributes to stop it showing in Explorer etc.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 3 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 7 IoCs
  • Enumerates connected drives 3 TTPs 64 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops autorun.inf file 1 TTPs 6 IoCs

    Malware can abuse Windows Autorun to spread further via attached volumes.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 64 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe 3 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Event Triggered Execution: Netsh Helper DLL 1 TTPs 18 IoCs

    Netsh.exe (also referred to as Netshell) is a command-line scripting utility used to interact with the network configuration of a system.

  • System Location Discovery: System Language Discovery 1 TTPs 64 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies Control Panel 5 IoCs
  • Modifies Internet Explorer settings 1 TTPs 14 IoCs
  • Modifies registry class 7 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Views/modifies file attributes 1 TTPs 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe"
    1⤵
    • Checks computer location settings
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops autorun.inf file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • System Location Discovery: System Language Discovery
    • Checks processor information in registry
    • Modifies Control Panel
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:640
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib -R -H -S "%appdata%\nvidgfx.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3872
      • C:\Windows\SysWOW64\attrib.exe
        attrib -R -H -S "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
        3⤵
        • Views/modifies file attributes
        PID:3696
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy /y "%temp%\nvidgfx.exe" "%appdata%\nvidgfx.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:4532
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +R +H +S "%appdata%\nvidgfx.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2472
      • C:\Windows\SysWOW64\attrib.exe
        attrib +R +H +S "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:3028
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\software\microsoft\windows\currentversion\run" /v "nvidgfx" /t REG_SZ /d "%appdata%\nvidgfx.exe" /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\reg.exe
        reg ADD "HKCU\software\microsoft\windows\currentversion\run" /v "nvidgfx" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\nvidgfx.exe" /f
        3⤵
        • Adds Run key to start application
        • System Location Discovery: System Language Discovery
        PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib -R -H -S "%windir%\system32\atlsyn.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3436
      • C:\Windows\SysWOW64\attrib.exe
        attrib -R -H -S "C:\Windows\system32\atlsyn.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        • Views/modifies file attributes
        PID:2684
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c copy /y "%temp%\nvidgfx.exe" "%windir%\system32\atlsyn.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2524
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c attrib +R +H +S "%windir%\system32\atlsyn.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4868
      • C:\Windows\SysWOW64\attrib.exe
        attrib +R +H +S "C:\Windows\system32\atlsyn.exe"
        3⤵
        • Sets file to hidden
        • Views/modifies file attributes
        PID:3312
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\System32\cmd.exe" /c md %appdata%\Microsoft\Windows
      2⤵
        PID:4564
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c attrib -R -H -S "%appdata%\Microsoft\Windows\spacedots.scr"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3592
        • C:\Windows\SysWOW64\attrib.exe
          attrib -R -H -S "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spacedots.scr"
          3⤵
          • System Location Discovery: System Language Discovery
          • Views/modifies file attributes
          PID:1052
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c copy /y "%temp%\nvidgfx.exe" "%appdata%\Microsoft\Windows\spacedots.scr"
        2⤵
          PID:2316
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c attrib +R +H +S "%appdata%\Microsoft\Windows\spacedots.scr"
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1604
          • C:\Windows\SysWOW64\attrib.exe
            attrib +R +H +S "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spacedots.scr"
            3⤵
            • Sets file to hidden
            • System Location Discovery: System Language Discovery
            • Views/modifies file attributes
            PID:1776
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\Control Panel\Desktop" /v "SCRNSAVE.EXE" /t REG_SZ /d "%appdata%\Microsoft\Windows\spacedots.scr" /f
          2⤵
          • System Location Discovery: System Language Discovery
          PID:1496
          • C:\Windows\SysWOW64\reg.exe
            reg ADD "HKCU\Control Panel\Desktop" /v "SCRNSAVE.EXE" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\spacedots.scr" /f
            3⤵
            • System Location Discovery: System Language Discovery
            PID:3712
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveActive /t REG_SZ /d "1" /f
          2⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\reg.exe
            reg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveActive /t REG_SZ /d "1" /f
            3⤵
              PID:2160
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c reg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveTimeOut /t REG_SZ /d "60" /f
            2⤵
              PID:2832
              • C:\Windows\SysWOW64\reg.exe
                reg ADD "HKCU\Control Panel\Desktop" /v ScreenSaveTimeOut /t REG_SZ /d "60" /f
                3⤵
                  PID:2240
              • C:\Users\Admin\AppData\Roaming\errorreporter.exe
                "C:\Users\Admin\AppData\Roaming\errorreporter.exe"
                2⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                PID:736
                • C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe
                  3⤵
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of SetWindowsHookEx
                  PID:4048
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h
                    4⤵
                      PID:3412
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" +s +h
                        5⤵
                        • Sets file to hidden
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Views/modifies file attributes
                        PID:1524
                    • C:\Windows\SysWOW64\cmd.exe
                      "C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:888
                      • C:\Windows\SysWOW64\attrib.exe
                        attrib "C:\Windows\Microsoft.NET\Framework\v2.0.50727" +s +h
                        5⤵
                        • Sets file to hidden
                        • Drops file in Windows directory
                        • System Location Discovery: System Language Discovery
                        • Views/modifies file attributes
                        PID:624
                    • C:\Windows\SysWOW64\notepad.exe
                      notepad
                      4⤵
                      • System Location Discovery: System Language Discovery
                      PID:840
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg ADD "HKCR\.zip\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3872
                  • C:\Windows\SysWOW64\reg.exe
                    reg ADD "HKCR\.zip\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f
                    3⤵
                    • Modifies registry class
                    PID:4412
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg ADD "HKCR\.zip\CompressedFolder\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3032
                  • C:\Windows\SysWOW64\reg.exe
                    reg ADD "HKCR\.zip\CompressedFolder\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    PID:4560
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /c reg ADD "HKCR\.rar\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3024
                  • C:\Windows\SysWOW64\reg.exe
                    reg ADD "HKCR\.rar\ShellNew" /v "FileName" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\newzip.dat" /f
                    3⤵
                    • System Location Discovery: System Language Discovery
                    • Modifies registry class
                    PID:3960
                • C:\Windows\SysWOW64\cmd.exe
                  C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Roaming\plugininstall.bat" "
                  2⤵
                  • System Location Discovery: System Language Discovery
                  PID:3440
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe" "winhttpsvc" ENABLE
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:220
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall add rule name="winhttpsvc" profile=public dir=in action=allow program="C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_83c698151d075740628ae7d8aaf39023.exe" enable=yes
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:3092
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall add portopening TCP 5220 "Open Port 5220"
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2960
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall firewall add rule name="Open Port 5220" profile=public dir=in action=allow protocol=TCP localport=5220
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:2712
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh advfirewall set currentprofile state off
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    PID:3612
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh firewall set opmode DISABLE
                    3⤵
                    • Modifies Windows Firewall
                    • Event Triggered Execution: Netsh Helper DLL
                    • System Location Discovery: System Language Discovery
                    PID:920
                  • C:\Windows\SysWOW64\sc.exe
                    sc config upnphost start= auto
                    3⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:2020
                  • C:\Windows\SysWOW64\sc.exe
                    sc config SSDPSRV start= auto
                    3⤵
                    • Launches sc.exe
                    • System Location Discovery: System Language Discovery
                    PID:4312
                  • C:\Windows\SysWOW64\sc.exe
                    sc config browser start= auto
                    3⤵
                    • Launches sc.exe
                    PID:1496
                  • C:\Windows\SysWOW64\net.exe
                    net start seclogon
                    3⤵
                      PID:4864
                      • C:\Windows\SysWOW64\net1.exe
                        C:\Windows\system32\net1 start seclogon
                        4⤵
                        • System Location Discovery: System Language Discovery
                        PID:4840
                    • C:\Windows\SysWOW64\net.exe
                      net start upnphost
                      3⤵
                        PID:2032
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start upnphost
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:1500
                      • C:\Windows\SysWOW64\net.exe
                        net start SSDPSRV
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:1976
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start SSDPSRV
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:2284
                      • C:\Windows\SysWOW64\net.exe
                        net start browser
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2516
                        • C:\Windows\SysWOW64\net1.exe
                          C:\Windows\system32\net1 start browser
                          4⤵
                          • System Location Discovery: System Language Discovery
                          PID:3332
                      • C:\Windows\SysWOW64\reg.exe
                        reg ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced" /v EnableBalloonTips /t REG_DWORD /d 0 /f
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2416
                      • C:\Windows\SysWOW64\reg.exe
                        reg DELETE "HKCU\software\microsoft\windows\currentversion\action center\checks" /f
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2988
                      • C:\Windows\SysWOW64\reg.exe
                        reg ADD "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System" /v EnableLUA /t REG_DWORD /d 0 /f
                        3⤵
                        • UAC bypass
                        • System Location Discovery: System Language Discovery
                        PID:1924
                      • C:\Windows\SysWOW64\reg.exe
                        reg ADD "HKLM\SYSTEM\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f
                        3⤵
                        • Modifies firewall policy service
                        PID:1080
                      • C:\Windows\SysWOW64\reg.exe
                        reg ADD "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\StandardProfile" /v EnableFirewall /t REG_DWORD /d 0 /f
                        3⤵
                        • System Location Discovery: System Language Discovery
                        PID:2164
                      • C:\Windows\SysWOW64\reg.exe
                        reg ADD "HKLM\SOFTWARE\Policies\Microsoft\WindowsFirewall\DomainProfile" /v EnableFirewall /t REG_DWORD /d 0 /f
                        3⤵
                          PID:2472
                        • C:\Windows\SysWOW64\reg.exe
                          reg ADD "HKLM\Software\Microsoft\Internet Explorer\Main\FeatureControl" /v FEATURE_WEBOC_POPUPMANAGEMENT /t REG_DWORD /d 0 /f
                          3⤵
                          • Modifies Internet Explorer settings
                          PID:4412
                        • C:\Windows\SysWOW64\reg.exe
                          reg ADD "HKLM\Software\Microsoft\Internet Explorer\Main" /v Show_FullURL /t REG_SZ /d yes /f
                          3⤵
                          • Modifies Internet Explorer settings
                          PID:3040
                        • C:\Windows\SysWOW64\reg.exe
                          reg ADD "HKLM\Software\Microsoft\Internet Explorer\Main" /v Show_StatusBar /t REG_SZ /d yes /f
                          3⤵
                          • Modifies Internet Explorer settings
                          PID:4264
                        • C:\Windows\SysWOW64\reg.exe
                          reg ADD "HKLM\Software\Microsoft\Internet Explorer\Main" /v Show_URLinStatusBar /t REG_SZ /d yes /f
                          3⤵
                          • Modifies Internet Explorer settings
                          PID:4828
                        • C:\Windows\SysWOW64\reg.exe
                          reg ADD "HKLM\Software\Microsoft\Internet Explorer\MINIE" /v ShowStatusBar /t REG_DWORD /d 1 /f
                          3⤵
                          • System Location Discovery: System Language Discovery
                          • Modifies Internet Explorer settings
                          PID:1520
                        • C:\Windows\SysWOW64\reg.exe
                          reg DELETE "HKCU\AppEvents\Schemes\Apps\Explorer\Navigating\.Current" /f
                          3⤵
                          • System Location Discovery: System Language Discovery
                          PID:1856
                        • C:\Windows\SysWOW64\reg.exe
                          reg DELETE "HKCU\AppEvents\Schemes\Apps\Explorer\Navigating\.Default" /f
                          3⤵
                            PID:3872
                          • C:\Windows\SysWOW64\reg.exe
                            reg ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v Check_Associations /t REG_SZ /d no /f
                            3⤵
                            • System Location Discovery: System Language Discovery
                            • Modifies Internet Explorer settings
                            PID:556
                          • C:\Windows\SysWOW64\reg.exe
                            reg ADD "HKCU\Software\Microsoft\Internet Explorer\Main" /v "DisableFirstRunCustomize" /t REG_DWORD /d "1" /f
                            3⤵
                            • Modifies Internet Explorer settings
                            PID:2836
                        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                          2⤵
                          • Drops desktop.ini file(s)
                          • Enumerates connected drives
                          • Suspicious use of AdjustPrivilegeToken
                          PID:736
                          • C:\Windows\SysWOW64\unregmp2.exe
                            "C:\Windows\System32\unregmp2.exe" /AsyncFirstLogon
                            3⤵
                            • System Location Discovery: System Language Discovery
                            PID:1052
                            • C:\Windows\system32\unregmp2.exe
                              "C:\Windows\SysNative\unregmp2.exe" /AsyncFirstLogon /REENTRANT
                              4⤵
                              • Enumerates connected drives
                              • Suspicious use of AdjustPrivilegeToken
                              PID:4684
                        • C:\Windows\SysWOW64\notepad.exe
                          "C:\Windows\System32\notepad.exe"
                          2⤵
                          • System Location Discovery: System Language Discovery
                          PID:1460
                        • C:\Windows\SysWOW64\rundll32.exe
                          "C:\Windows\System32\rundll32.exe"
                          2⤵
                            PID:1236
                          • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
                            "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4876
                          • C:\Windows\SysWOW64\notepad.exe
                            "C:\Windows\System32\notepad.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3048
                          • C:\Windows\SysWOW64\rundll32.exe
                            "C:\Windows\System32\rundll32.exe"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:3016
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c attrib +R +H "C:\autorun.inf"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4952
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib +R +H "C:\autorun.inf"
                              3⤵
                              • Sets file to hidden
                              • Drops autorun.inf file
                              • Views/modifies file attributes
                              PID:4320
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c attrib +R +H "F:\autorun.inf"
                            2⤵
                            • System Location Discovery: System Language Discovery
                            PID:4984
                            • C:\Windows\SysWOW64\attrib.exe
                              attrib +R +H "F:\autorun.inf"
                              3⤵
                              • Sets file to hidden
                              • Drops autorun.inf file
                              • System Location Discovery: System Language Discovery
                              • Views/modifies file attributes
                              PID:1588
                          • C:\Windows\SysWOW64\cmd.exe
                            "C:\Windows\System32\cmd.exe" /c attrib -R -H "F:\protect.bat"
                            2⤵
                              PID:1624
                              • C:\Windows\SysWOW64\attrib.exe
                                attrib -R -H "F:\protect.bat"
                                3⤵
                                • Views/modifies file attributes
                                PID:3460
                            • C:\Windows\SysWOW64\cmd.exe
                              "C:\Windows\System32\cmd.exe" /c attrib -R -H "C:\protect.bat"
                              2⤵
                                PID:3712
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib -R -H "C:\protect.bat"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Views/modifies file attributes
                                  PID:3660
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c attrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                2⤵
                                • System Location Discovery: System Language Discovery
                                PID:2196
                                • C:\Windows\SysWOW64\attrib.exe
                                  attrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                  3⤵
                                  • System Location Discovery: System Language Discovery
                                  • Views/modifies file attributes
                                  PID:1240
                              • C:\Windows\SysWOW64\cmd.exe
                                "C:\Windows\System32\cmd.exe" /c attrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                2⤵
                                  PID:4108
                                  • C:\Windows\SysWOW64\attrib.exe
                                    attrib -S -R -H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                    3⤵
                                    • System Location Discovery: System Language Discovery
                                    • Views/modifies file attributes
                                    PID:1400
                                • C:\Windows\SysWOW64\cmd.exe
                                  "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Roaming\nvidgfx.exe" "C:\protect.bat"
                                  2⤵
                                    PID:4056
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c copy /y "C:\Users\Admin\AppData\Roaming\nvidgfx.exe" "F:\protect.bat"
                                    2⤵
                                    • System Location Discovery: System Language Discovery
                                    PID:412
                                  • C:\Windows\SysWOW64\cmd.exe
                                    "C:\Windows\System32\cmd.exe" /c attrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                    2⤵
                                      PID:3472
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                        3⤵
                                        • Sets file to hidden
                                        • System Location Discovery: System Language Discovery
                                        • Views/modifies file attributes
                                        PID:3872
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c attrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:624
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib +S +R +H "C:\Users\Admin\AppData\Roaming\nvidgfx.exe"
                                        3⤵
                                        • Sets file to hidden
                                        • System Location Discovery: System Language Discovery
                                        • Views/modifies file attributes
                                        PID:1396
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c attrib +R +H "C:\protect.bat"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:3436
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib +R +H "C:\protect.bat"
                                        3⤵
                                        • Sets file to hidden
                                        • System Location Discovery: System Language Discovery
                                        • Views/modifies file attributes
                                        PID:3092
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /c attrib +R +H "F:\protect.bat"
                                      2⤵
                                      • System Location Discovery: System Language Discovery
                                      PID:4844
                                      • C:\Windows\SysWOW64\attrib.exe
                                        attrib +R +H "F:\protect.bat"
                                        3⤵
                                        • Sets file to hidden
                                        • Views/modifies file attributes
                                        PID:2524
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s upnphost
                                    1⤵
                                    • Drops file in Windows directory
                                    PID:4472

                                  Network

                                  MITRE ATT&CK Enterprise v15

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                    Filesize

                                    256KB

                                    MD5

                                    adbd8353954edbe5e0620c5bdcad4363

                                    SHA1

                                    aeb5c03e8c1b8bc5d55683ea113e6ce1be7ac6e6

                                    SHA256

                                    64eff10c4e866930d32d4d82cc88ec0e6f851ac49164122cae1b27eb3c9d9d55

                                    SHA512

                                    87bf4a2dc4dd5c833d96f3f5cb0b607796414ffee36d5c167a75644bcbb02ab5159aa4aa093ed43abe290481abc01944885c68b1755d9b2c4c583fcccd041fd2

                                  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\CurrentDatabase_400.wmdb

                                    Filesize

                                    1024KB

                                    MD5

                                    2e7a2c89af4d331ba7a01f1584769ba1

                                    SHA1

                                    3011850250b9398d68f8bea61e3ba737b6453511

                                    SHA256

                                    f998da16f659ed330a648df4b8de75e939c6a4098af82a561fd12f2a5c3dcd67

                                    SHA512

                                    fbea81f615c7033acf762c53dbb08a849921d3f72d7755502097a5efd534bb3596c6c9e260b9a0da5e71863bb25b067fc46c59e776391b8cc4ffc1fc42953051

                                  • C:\Users\Admin\AppData\Local\Microsoft\Media Player\LocalMLS_3.wmdb

                                    Filesize

                                    68KB

                                    MD5

                                    93cae9bc4a8f4b98ff194011c7340034

                                    SHA1

                                    d826e8ac0b783ead34007a8e7f1c50bf73b3df1b

                                    SHA256

                                    9062a88cbcd89cc2e62a22549e2bbeef36b98f4e27ea62d2347282bb7158f64b

                                    SHA512

                                    582f68ef0b226848a6d49f4cd83722af8a26afe206376196e1365438de1fcab8b728de3f26b2bd83f02fe7e5b84c6ddda498e69acd25f4f16e4f56ef66b050de

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.DTD

                                    Filesize

                                    498B

                                    MD5

                                    90be2701c8112bebc6bd58a7de19846e

                                    SHA1

                                    a95be407036982392e2e684fb9ff6602ecad6f1e

                                    SHA256

                                    644fbcdc20086e16d57f31c5bad98be68d02b1c061938d2f5f91cbe88c871fbf

                                    SHA512

                                    d618b473b68b48d746c912ac5fc06c73b047bd35a44a6efc7a859fe1162d68015cf69da41a5db504dcbc4928e360c095b32a3b7792fcc6a38072e1ebd12e7cbe

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML

                                    Filesize

                                    9KB

                                    MD5

                                    5433eab10c6b5c6d55b7cbd302426a39

                                    SHA1

                                    c5b1604b3350dab290d081eecd5389a895c58de5

                                    SHA256

                                    23dbf7014e99e93af5f2760f18ee1370274f06a453145c8d539b66d798dad131

                                    SHA512

                                    207b40d6bec65ab147f963a5f42263ae5bf39857987b439a4fa1647bf9b40e99cdc43ff68b7e2463aa9a948284126ac3c9c7af8350c91134b36d8b1a9c61fd34

                                  • C:\Users\Admin\AppData\Local\Microsoft\Windows Media\12.0\WMSDKNS.XML.bak

                                    Filesize

                                    9KB

                                    MD5

                                    7050d5ae8acfbe560fa11073fef8185d

                                    SHA1

                                    5bc38e77ff06785fe0aec5a345c4ccd15752560e

                                    SHA256

                                    cb87767c4a384c24e4a0f88455f59101b1ae7b4fb8de8a5adb4136c5f7ee545b

                                    SHA512

                                    a7a295ac8921bb3dde58d4bcde9372ed59def61d4b7699057274960fa8c1d1a1daff834a93f7a0698e9e5c16db43af05e9fd2d6d7c9232f7d26ffcff5fc5900b

                                  • C:\Users\Admin\AppData\Local\Temp\wmsetup.log

                                    Filesize

                                    1KB

                                    MD5

                                    c66bc2c556367438c522a9b43215975d

                                    SHA1

                                    68bf2516d62af463621e96a0688627f73d6846c8

                                    SHA256

                                    27025182e32e8e5c0d5145166a2e90bc876399f576c4258e9c11c69db787cdf6

                                    SHA512

                                    af2377c1c8c5f82d8afa0c9ba802bb81470266cae43cfe89fe8c4ccb73d89e04c00b0cd033941642df2f431d283e1d0327dea6822dc7ae7fd2aace1f0dcd556f

                                  • C:\Users\Admin\AppData\Roaming\auth.dll

                                    Filesize

                                    195KB

                                    MD5

                                    15b8f3be2d9a25def6093dc2d6e1c6b8

                                    SHA1

                                    d9adbe4762882de29e0c1dc4aeddf89016a7f94e

                                    SHA256

                                    6aff3d70fdc4eb3bfaf610fdad422040e25ab82f7d993d88dc94ccd2f5a96c86

                                    SHA512

                                    310a1d6336d4ced1d956fad8b490cafdda697612db0f8e4f98ed7ad76817171cd5af2e8e9778ec803a40a768fa41e52d176f0a2ebc4e6a4182c61b82203d7658

                                  • C:\Users\Admin\AppData\Roaming\errorreporter.exe

                                    Filesize

                                    692KB

                                    MD5

                                    479f8bcbe5729d18e3c42a9b4aeddfac

                                    SHA1

                                    dcb37fb7bc0c067c08b4d0b60163b00db59cc411

                                    SHA256

                                    7a8efe13b9e02f29c582541a9890282c1e1004b699463517b5ef1de898db8cd3

                                    SHA512

                                    2f980051619245d1eba473fd43bf4046b3a2504bdf053180b2ae65058faa0a097517111853261ff88da944ec520d659fb2ab0236f966056fb2e0158958e35888

                                  • C:\Users\Admin\AppData\Roaming\plugininstall.bat

                                    Filesize

                                    2KB

                                    MD5

                                    9592aa50bf0bfeefbc47eb4bdacfbaab

                                    SHA1

                                    21a7b9683f6f1374f5f785882a1c1bd05f392c9e

                                    SHA256

                                    7a6717ff7d2b63a879b504c0826ec8e3cf25d1616035c8fb70c7d0d932e74ed4

                                    SHA512

                                    bfa01bc5c62dbcb3be8f853ca1f1569600f07a3d54b9e19f93fc2353ad201486074c7b9372721e43fb39b0aa3403b010d31475e4d2de8e74fc9719eda3cbcf00

                                  • F:\autorun.inf

                                    Filesize

                                    63B

                                    MD5

                                    f64baf418f685884efec59a9d80bc5f6

                                    SHA1

                                    9c90f7a7efd7ef3059837fdeb06b6b781ca6d1e9

                                    SHA256

                                    4b9870b1f52e252451b3fa099e8b270c32ddc6fc29372067be28dcd009ec4e8f

                                    SHA512

                                    dceecd6a564c974c71ceeb544b0dfde70a09315db6d72a50fdbecdc0cf505a7ce52b7a83a9a8c79e8cfbb996c054585da6d7c08bf0026b4d9ecdde5f0a2b2a69

                                  • memory/640-162-0x0000000003510000-0x0000000003549000-memory.dmp

                                    Filesize

                                    228KB

                                  • memory/640-0-0x0000000010000000-0x0000000010100000-memory.dmp

                                    Filesize

                                    1024KB

                                  • memory/840-81-0x00000000009C0000-0x00000000009C1000-memory.dmp

                                    Filesize

                                    4KB

                                  • memory/4048-78-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB

                                  • memory/4048-82-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB

                                  • memory/4048-80-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB

                                  • memory/4048-156-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB

                                  • memory/4048-95-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB

                                  • memory/4048-90-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB

                                  • memory/4048-83-0x0000000000400000-0x00000000004B6000-memory.dmp

                                    Filesize

                                    728KB