Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
09/04/2025, 18:55
Behavioral task
behavioral1
Sample
JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe
-
Size
59KB
-
MD5
a6568c74c15d79c4312ca47f9e1e3b42
-
SHA1
63e3b8cff69eb3561dddf28b042671cb0c8d2ef4
-
SHA256
8ccb78e4c7e15c353c3310896dcee5ab60b651743d779cb7384a66654e8a9454
-
SHA512
e39057c7cdab408cec9e8adc73975c03f0551137adbf9b9849a79719c0cb470e07f265ed6c5f059bfa752d12591fc89c0c0e348e6fd57c066d85c15b42a1cc36
-
SSDEEP
768:FghGEX/ija+1IJmhh9F3oPg+8ZhjPyf+dmb84ioypo/VYCfsM18wDOoHHPRiv9KU:mGEmhhMY+3fewoo2uYCqWVPAv9/3qQ9v
Malware Config
Signatures
-
Brute Ratel C4
A customized command and control framework for red teaming and adversary simulation.
-
Bruteratel family
-
Detect BruteRatel badger 1 IoCs
resource yara_rule behavioral1/files/0x00080000000242e9-12.dat family_bruteratel -
Executes dropped EXE 39 IoCs
pid Process 4008 vsbntlo.exe 3976 vsbntlo.exe 548 vsbntlo.exe 2580 vsbntlo.exe 1816 vsbntlo.exe 4664 vsbntlo.exe 368 vsbntlo.exe 1700 vsbntlo.exe 6116 vsbntlo.exe 4800 vsbntlo.exe 4196 vsbntlo.exe 4612 vsbntlo.exe 4028 vsbntlo.exe 6004 vsbntlo.exe 3884 vsbntlo.exe 1548 vsbntlo.exe 2684 vsbntlo.exe 3780 vsbntlo.exe 1300 vsbntlo.exe 5364 vsbntlo.exe 540 vsbntlo.exe 5984 vsbntlo.exe 1244 vsbntlo.exe 3260 vsbntlo.exe 3448 vsbntlo.exe 1184 vsbntlo.exe 1144 vsbntlo.exe 3476 vsbntlo.exe 3896 vsbntlo.exe 5248 vsbntlo.exe 2364 vsbntlo.exe 3568 vsbntlo.exe 5020 vsbntlo.exe 3720 vsbntlo.exe 2084 vsbntlo.exe 5408 vsbntlo.exe 4196 vsbntlo.exe 5840 vsbntlo.exe 4544 vsbntlo.exe -
Adds Run key to start application 2 TTPs 20 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe Set value (str) \REGISTRY\USER\S-1-5-21-3342763580-2723508992-2885672917-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\12CFG214-K641-12SF-N85P = "C:\\RECYCLER\\S-1-5-21-0243936033-3052116371-381863308-1811\\vsbntlo.exe" vsbntlo.exe -
Drops desktop.ini file(s) 1 IoCs
description ioc Process File created C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\Desktop.ini JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe -
Suspicious use of SetThreadContext 20 IoCs
description pid Process procid_target PID 5608 set thread context of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 4008 set thread context of 3976 4008 vsbntlo.exe 103 PID 548 set thread context of 2580 548 vsbntlo.exe 107 PID 1816 set thread context of 4664 1816 vsbntlo.exe 111 PID 368 set thread context of 1700 368 vsbntlo.exe 120 PID 6116 set thread context of 4800 6116 vsbntlo.exe 128 PID 4196 set thread context of 4612 4196 vsbntlo.exe 132 PID 4028 set thread context of 6004 4028 vsbntlo.exe 136 PID 3884 set thread context of 1548 3884 vsbntlo.exe 140 PID 2684 set thread context of 3780 2684 vsbntlo.exe 145 PID 1300 set thread context of 5364 1300 vsbntlo.exe 149 PID 540 set thread context of 5984 540 vsbntlo.exe 153 PID 1244 set thread context of 3260 1244 vsbntlo.exe 157 PID 3448 set thread context of 1184 3448 vsbntlo.exe 161 PID 1144 set thread context of 3476 1144 vsbntlo.exe 165 PID 3896 set thread context of 5248 3896 vsbntlo.exe 169 PID 2364 set thread context of 3568 2364 vsbntlo.exe 173 PID 5020 set thread context of 3720 5020 vsbntlo.exe 177 PID 2084 set thread context of 5408 2084 vsbntlo.exe 181 PID 4196 set thread context of 5840 4196 vsbntlo.exe 185 -
System Location Discovery: System Language Discovery 1 TTPs 20 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vsbntlo.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1492 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 1492 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 3976 vsbntlo.exe 3976 vsbntlo.exe 2580 vsbntlo.exe 2580 vsbntlo.exe 4664 vsbntlo.exe 4664 vsbntlo.exe 1700 vsbntlo.exe 1700 vsbntlo.exe 4800 vsbntlo.exe 4800 vsbntlo.exe 4612 vsbntlo.exe 4612 vsbntlo.exe 6004 vsbntlo.exe 6004 vsbntlo.exe 1548 vsbntlo.exe 1548 vsbntlo.exe 3780 vsbntlo.exe 3780 vsbntlo.exe 5364 vsbntlo.exe 5364 vsbntlo.exe 5984 vsbntlo.exe 5984 vsbntlo.exe 3260 vsbntlo.exe 3260 vsbntlo.exe 1184 vsbntlo.exe 1184 vsbntlo.exe 3476 vsbntlo.exe 3476 vsbntlo.exe 5248 vsbntlo.exe 5248 vsbntlo.exe 3568 vsbntlo.exe 3568 vsbntlo.exe 3720 vsbntlo.exe 3720 vsbntlo.exe 5408 vsbntlo.exe 5408 vsbntlo.exe 5840 vsbntlo.exe 5840 vsbntlo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 5608 wrote to memory of 1492 5608 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 97 PID 1492 wrote to memory of 3520 1492 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 56 PID 1492 wrote to memory of 3520 1492 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 56 PID 1492 wrote to memory of 3520 1492 JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe 56 PID 4840 wrote to memory of 4008 4840 cmd.exe 100 PID 4840 wrote to memory of 4008 4840 cmd.exe 100 PID 4840 wrote to memory of 4008 4840 cmd.exe 100 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 4008 wrote to memory of 3976 4008 vsbntlo.exe 103 PID 3976 wrote to memory of 3520 3976 vsbntlo.exe 56 PID 3976 wrote to memory of 3520 3976 vsbntlo.exe 56 PID 3976 wrote to memory of 3520 3976 vsbntlo.exe 56 PID 892 wrote to memory of 548 892 cmd.exe 106 PID 892 wrote to memory of 548 892 cmd.exe 106 PID 892 wrote to memory of 548 892 cmd.exe 106 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 548 wrote to memory of 2580 548 vsbntlo.exe 107 PID 2580 wrote to memory of 3520 2580 vsbntlo.exe 56 PID 2580 wrote to memory of 3520 2580 vsbntlo.exe 56 PID 2580 wrote to memory of 3520 2580 vsbntlo.exe 56 PID 540 wrote to memory of 1816 540 cmd.exe 110 PID 540 wrote to memory of 1816 540 cmd.exe 110 PID 540 wrote to memory of 1816 540 cmd.exe 110 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 1816 wrote to memory of 4664 1816 vsbntlo.exe 111 PID 4664 wrote to memory of 3520 4664 vsbntlo.exe 56 PID 4664 wrote to memory of 3520 4664 vsbntlo.exe 56 PID 4664 wrote to memory of 3520 4664 vsbntlo.exe 56 PID 3616 wrote to memory of 368 3616 cmd.exe 114 PID 3616 wrote to memory of 368 3616 cmd.exe 114 PID 3616 wrote to memory of 368 3616 cmd.exe 114 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120 PID 368 wrote to memory of 1700 368 vsbntlo.exe 120
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5608 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_a6568c74c15d79c4312ca47f9e1e3b42.exe"3⤵
- Adds Run key to start application
- Drops desktop.ini file(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1492
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3976
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵
- Suspicious use of WriteProcessMemory
PID:892 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:548 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2580
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵
- Suspicious use of WriteProcessMemory
PID:540 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4664
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:368 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:3564
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6116 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4800
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:2236
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4196 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:4612
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:4720
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4028 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:6004
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:4468
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3884 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1548
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:924
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2684 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3780
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:1640
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1300 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5364
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:4420
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:540 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5984
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:816
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1244 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3260
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:1832
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3448 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1184
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:5124
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1144 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3476
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:1012
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3896 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5248
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:5584
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2364 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3568
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:4536
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5020 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:3720
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:4304
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2084 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5408
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:5824
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4196 -
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:5840
-
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe2⤵PID:5168
-
C:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exeC:\RECYCLER\S-1-5-21-0243936033-3052116371-381863308-1811\vsbntlo.exe3⤵
- Executes dropped EXE
PID:4544
-
-
Network
MITRE ATT&CK Enterprise v16
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
59KB
MD5a6568c74c15d79c4312ca47f9e1e3b42
SHA163e3b8cff69eb3561dddf28b042671cb0c8d2ef4
SHA2568ccb78e4c7e15c353c3310896dcee5ab60b651743d779cb7384a66654e8a9454
SHA512e39057c7cdab408cec9e8adc73975c03f0551137adbf9b9849a79719c0cb470e07f265ed6c5f059bfa752d12591fc89c0c0e348e6fd57c066d85c15b42a1cc36