Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23/03/2025, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_88331fa7186eae321b6bdbd70156c660.dll
Resource
win7-20241010-en
General
-
Target
JaffaCakes118_88331fa7186eae321b6bdbd70156c660.dll
-
Size
675KB
-
MD5
88331fa7186eae321b6bdbd70156c660
-
SHA1
f9b89602f33eb826c5ac89d3a879b94f90bb102f
-
SHA256
dc60d3a67b01f1a28916c318e31f29a50a87c0e85d36ea9e81bffe5bcd692d98
-
SHA512
412d0f2c50e3254a87d8d4465e4edb26db478b3a8f320c205d378e7029c2f0df64a6cff54f55b90d6b16a114be133205c457c82d60e39aca2928ccf2f2f99387
-
SSDEEP
12288:B79qXvjRc5AoIY+NPUlWnoAsCZLZXdBbqO/r2:DqXvjRc5AoITcknoBCZLZXnbxi
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,c:\\program files (x86)\\microsoft\\watermark.exe" svchost.exe -
Ramnit family
-
Executes dropped EXE 6 IoCs
pid Process 1396 rundll32mgr.exe 2924 rundll32mgrmgr.exe 2956 WaterMark.exe 1676 WaterMark.exe 2720 WaterMarkmgr.exe 2332 WaterMark.exe -
Loads dropped DLL 12 IoCs
pid Process 2768 rundll32.exe 2768 rundll32.exe 1396 rundll32mgr.exe 1396 rundll32mgr.exe 1396 rundll32mgr.exe 1396 rundll32mgr.exe 2924 rundll32mgrmgr.exe 2924 rundll32mgrmgr.exe 2956 WaterMark.exe 2956 WaterMark.exe 2720 WaterMarkmgr.exe 2720 WaterMarkmgr.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\rundll32mgr.exe rundll32.exe File created C:\Windows\SysWOW64\rundll32mgrmgr.exe rundll32mgr.exe File created C:\Windows\SysWOW64\dmlconf.dat svchost.exe File opened for modification C:\Windows\SysWOW64\dmlconf.dat svchost.exe -
resource yara_rule behavioral1/memory/1396-32-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1396-34-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2924-40-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1676-105-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1676-76-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2332-157-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2956-145-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2956-99-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2332-96-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2720-86-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/2924-50-0x0000000000340000-0x00000000003A4000-memory.dmp upx behavioral1/memory/1396-31-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1396-25-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1396-23-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1396-22-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1396-24-0x0000000000400000-0x0000000000421000-memory.dmp upx behavioral1/memory/1676-846-0x0000000000400000-0x0000000000421000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\2052\hxdsui.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\de\PresentationFramework.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libvpx_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\video_filter\libgradfun_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Mail\oeimport.dll svchost.exe File opened for modification C:\Program Files\Windows Photo Viewer\ImagingDevices.exe svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\1046\hxdsui.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\demux\libvobsub_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Defender\MsMpRes.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkWatson.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\glass.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\es\WindowsFormsIntegration.resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\System.ServiceModel.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\libspdif_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\Adobe\Updater6\Adobe_Updater.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\fr\Microsoft.Build.Engine.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\audio_filter\libparam_eq_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Journal\JNWDRV.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\CPU.Gadget\de-DE\cpu.html svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\fr-FR\settings.html svchost.exe File created C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe WaterMark.exe File opened for modification C:\Program Files\DVD Maker\WMM2CLIP.dll svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\106.0.5249.119\chrome_wer.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\awt.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\ktab.exe svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\ja\System.Data.Services.resources.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\RSSFeeds.Gadget\es-ES\settings.html svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\CsiSoap.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\perfcore.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\db\README-JDK.html svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.ServiceModel.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\es\System.Data.DataSetExtensions.Resources.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.5\System.Data.Entity.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\libdummy_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Adobe\Reader 9.0\Reader\ACE.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkObj.dll svchost.exe File opened for modification C:\Program Files\DVD Maker\DVDMaker.exe svchost.exe File opened for modification C:\Program Files\Internet Explorer\ieinstal.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\libxslt.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\npt.dll svchost.exe File opened for modification C:\Program Files\Reference Assemblies\Microsoft\Framework\v3.0\ja\System.Speech.resources.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\access\liblive555_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\codec\librtpvideo_plugin.dll svchost.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\ink\InkDiv.dll svchost.exe File opened for modification C:\Program Files (x86)\Microsoft\px7B77.tmp rundll32mgr.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\jre\bin\t2k.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\control\liboldrc_plugin.dll svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\gui\libskins2_plugin.dll svchost.exe File opened for modification C:\Program Files\Windows Sidebar\Gadgets\Weather.Gadget\ja-JP\weather.html svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\DAO\dao360.dll svchost.exe File opened for modification C:\Program Files\Internet Explorer\DiagnosticsHub_is.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.filetransfer.feature_3.9.0.v20140827-1444\about.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\lua\http\dialogs\error_window.html svchost.exe File opened for modification C:\Program Files\VideoLAN\VLC\plugins\stream_out\libstream_out_record_plugin.dll svchost.exe File opened for modification C:\Program Files (x86)\Common Files\microsoft shared\Help\hxds.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\ado\msadox.dll svchost.exe File opened for modification C:\Program Files\Common Files\System\msadc\msadcfr.dll svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\klist.exe svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\glass.dll svchost.exe File opened for modification C:\Program Files\Java\jre7\bin\java.dll svchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 13 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMarkmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32mgrmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WaterMark.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 2956 WaterMark.exe 2956 WaterMark.exe 1676 WaterMark.exe 1676 WaterMark.exe 2332 WaterMark.exe 2332 WaterMark.exe 1676 WaterMark.exe 2332 WaterMark.exe 2332 WaterMark.exe 1676 WaterMark.exe 2332 WaterMark.exe 1676 WaterMark.exe 2332 WaterMark.exe 1676 WaterMark.exe 2956 WaterMark.exe 2956 WaterMark.exe 2956 WaterMark.exe 1676 WaterMark.exe 2956 WaterMark.exe 1676 WaterMark.exe 2956 WaterMark.exe 2956 WaterMark.exe 2332 WaterMark.exe 2332 WaterMark.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe 2276 svchost.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 2956 WaterMark.exe Token: SeDebugPrivilege 1676 WaterMark.exe Token: SeDebugPrivilege 2332 WaterMark.exe Token: SeDebugPrivilege 2276 svchost.exe Token: SeDebugPrivilege 2076 svchost.exe Token: SeDebugPrivilege 2452 svchost.exe Token: SeDebugPrivilege 1676 WaterMark.exe Token: SeDebugPrivilege 2956 WaterMark.exe Token: SeDebugPrivilege 2332 WaterMark.exe Token: SeDebugPrivilege 3016 svchost.exe Token: SeDebugPrivilege 1784 svchost.exe -
Suspicious use of UnmapMainImage 6 IoCs
pid Process 1396 rundll32mgr.exe 2924 rundll32mgrmgr.exe 2956 WaterMark.exe 1676 WaterMark.exe 2720 WaterMarkmgr.exe 2332 WaterMark.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 3032 wrote to memory of 2768 3032 rundll32.exe 30 PID 2768 wrote to memory of 1396 2768 rundll32.exe 31 PID 2768 wrote to memory of 1396 2768 rundll32.exe 31 PID 2768 wrote to memory of 1396 2768 rundll32.exe 31 PID 2768 wrote to memory of 1396 2768 rundll32.exe 31 PID 1396 wrote to memory of 2924 1396 rundll32mgr.exe 32 PID 1396 wrote to memory of 2924 1396 rundll32mgr.exe 32 PID 1396 wrote to memory of 2924 1396 rundll32mgr.exe 32 PID 1396 wrote to memory of 2924 1396 rundll32mgr.exe 32 PID 1396 wrote to memory of 1676 1396 rundll32mgr.exe 33 PID 1396 wrote to memory of 1676 1396 rundll32mgr.exe 33 PID 1396 wrote to memory of 1676 1396 rundll32mgr.exe 33 PID 1396 wrote to memory of 1676 1396 rundll32mgr.exe 33 PID 2924 wrote to memory of 2956 2924 rundll32mgrmgr.exe 34 PID 2924 wrote to memory of 2956 2924 rundll32mgrmgr.exe 34 PID 2924 wrote to memory of 2956 2924 rundll32mgrmgr.exe 34 PID 2924 wrote to memory of 2956 2924 rundll32mgrmgr.exe 34 PID 2956 wrote to memory of 2720 2956 WaterMark.exe 35 PID 2956 wrote to memory of 2720 2956 WaterMark.exe 35 PID 2956 wrote to memory of 2720 2956 WaterMark.exe 35 PID 2956 wrote to memory of 2720 2956 WaterMark.exe 35 PID 2720 wrote to memory of 2332 2720 WaterMarkmgr.exe 36 PID 2720 wrote to memory of 2332 2720 WaterMarkmgr.exe 36 PID 2720 wrote to memory of 2332 2720 WaterMarkmgr.exe 36 PID 2720 wrote to memory of 2332 2720 WaterMarkmgr.exe 36 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 1676 wrote to memory of 3016 1676 WaterMark.exe 37 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2332 wrote to memory of 1784 2332 WaterMark.exe 38 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 2956 wrote to memory of 2968 2956 WaterMark.exe 39 PID 1676 wrote to memory of 2276 1676 WaterMark.exe 41 PID 1676 wrote to memory of 2276 1676 WaterMark.exe 41 PID 1676 wrote to memory of 2276 1676 WaterMark.exe 41
Processes
-
C:\Windows\System32\smss.exe\SystemRoot\System32\smss.exe1⤵PID:256
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:336
-
C:\Windows\system32\wininit.exewininit.exe1⤵PID:372
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe2⤵PID:464
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch3⤵PID:604
-
C:\Windows\system32\wbem\wmiprvse.exeC:\Windows\system32\wbem\wmiprvse.exe4⤵PID:1592
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}4⤵PID:952
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS3⤵PID:680
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted3⤵PID:756
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted3⤵PID:816
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"4⤵PID:1156
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs3⤵PID:856
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService3⤵PID:1000
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService3⤵PID:328
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe3⤵PID:1032
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"3⤵PID:1084
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork3⤵PID:1104
-
-
C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"C:\Program Files\Common Files\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE"3⤵PID:864
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation3⤵PID:1928
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe3⤵PID:1892
-
-
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe2⤵PID:484
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe2⤵PID:492
-
-
C:\Windows\system32\csrss.exe%SystemRoot%\system32\csrss.exe ObjectDirectory=\Windows SharedSection=1024,20480,768 Windows=On SubSystemType=Windows ServerDll=basesrv,1 ServerDll=winsrv:UserServerDllInitialization,3 ServerDll=winsrv:ConServerDllInitialization,2 ServerDll=sxssrv,4 ProfileControl=Off MaxRequestThreads=161⤵PID:384
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1180
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88331fa7186eae321b6bdbd70156c660.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_88331fa7186eae321b6bdbd70156c660.dll,#13⤵
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\rundll32mgr.exeC:\Windows\SysWOW64\rundll32mgr.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1396 -
C:\Windows\SysWOW64\rundll32mgrmgr.exeC:\Windows\SysWOW64\rundll32mgrmgr.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"C:\Program Files (x86)\Microsoft\WaterMarkmgr.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1784
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe9⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2452
-
-
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
PID:2968
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe7⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2076
-
-
-
-
C:\Program Files (x86)\Microsoft\WaterMark.exe"C:\Program Files (x86)\Microsoft\WaterMark.exe"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3016
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\epl-v10.html
Filesize693KB
MD5911b0e2132d4f56321b4eeee6f948d32
SHA14d74924754a0644305609a2b58866e2ee4cc7ad9
SHA2565abf42098ea7fac3c3fdc4ac9c9830b4c3343bb189780c0e3898b990993f7b97
SHA51268a019933176bdaa6e8e24c6cca967bce047da86060f918511df8dbf04cdf5d8e64f0baf4f7e6b373600e3a10a83f75f7fe7bd956dac85834cdc7e26d1696e75
-
C:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\features\org.eclipse.ecf.core.ssl.feature_1.0.0.v20140827-1444\license.html
Filesize689KB
MD5ca49218174c2b08f7f56f7e49d2e97cd
SHA16f2c84da4ca4a50fb5fcb852a059cbdf163a1c21
SHA2568e001b2f981ba55290f5b39eb70394ff952c71bcd1c3e5cf16f85cfa86107955
SHA5125696f2d3c5b12a172b34695c9e4688494a3503ae59941694f3cab927a7b1acff741fb9fc7b585353e79d7e888b469503dcdb824533d72de1f336d7627c7eadaa
-
Filesize
339KB
MD586eaaa35132233d20e0f61f82748cc64
SHA1cc6cf70f0c8f1b98d029d091406cee60e17d6af8
SHA25647537bff845a5b844418ab0691f5931014e06d4de1ba64b39eebc5b76ae1a181
SHA512c835343bd16509a7de958ffb8e71fc679ae8a9f251dc975b426125e058c583e7ab576975a4afc723b7763fedbc3ed3c2185043585103a555c4c60d10939fd38e
-
Filesize
168KB
MD50943b815c588255874985439061ba474
SHA131ad4cdb76003b35f553cb96c78d887e7c960eba
SHA2567b1559c2f8d511f7be152a22809b358088048fc3e00d9963b92ad0ecb384bf51
SHA512fce7596624b5c224cbaaae55c4b224ff995eea33ed0ca9d40c33cfb5ffaa98f387f267175788f5431ca7209c2c69ef1024b9541f7b53a1a3c6412b09a19bd601