Analysis
-
max time kernel
19s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29-03-2024 07:28
Static task
static1
Behavioral task
behavioral1
Sample
1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe
Resource
win10v2004-20231215-en
General
-
Target
1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe
-
Size
200KB
-
MD5
1c323571263fae709a03a787aa4416aa
-
SHA1
1b4ded050e06e6f69673fe58bca449463dada9d6
-
SHA256
f71df94cb7a60777ee2c105d8f9fa10772ad43a36f9f9d013026704b809c96de
-
SHA512
7fb6dec1950b29c37338712cb19155c3bd7b1ad67497900489dea54d63dc9e89daed4506a89aba2d5503a30040a92b5b64aa4378b7e920f7a055ccbf07ad2efc
-
SSDEEP
3072:r1LipdLEQcDFjVPKvFd4jxHMgcosvFSZjLxMmnWmjEChTBs3/JEZb2SWi:r+LEQyg9OpAF2LxxWWEChTBsBanWi
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 2 IoCs
pid Process 2620 HeAYEkoA.exe 1136 egUwIcsE.exe -
Loads dropped DLL 20 IoCs
pid Process 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe 1136 egUwIcsE.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\egUwIcsE.exe = "C:\\Users\\Admin\\heEsMwEc\\egUwIcsE.exe" egUwIcsE.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HeAYEkoA.exe = "C:\\ProgramData\\OIEwIUow\\HeAYEkoA.exe" HeAYEkoA.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\egUwIcsE.exe = "C:\\Users\\Admin\\heEsMwEc\\egUwIcsE.exe" 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HeAYEkoA.exe = "C:\\ProgramData\\OIEwIUow\\HeAYEkoA.exe" 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 2592 1456 WerFault.exe 1171 2736 1764 WerFault.exe 200 -
Modifies registry key 1 TTPs 64 IoCs
pid Process 1060 reg.exe 336 reg.exe 2188 reg.exe 2908 reg.exe 452 reg.exe 1752 reg.exe 2108 reg.exe 2772 reg.exe 1516 reg.exe 1304 reg.exe 2076 reg.exe 2788 reg.exe 2068 reg.exe 584 reg.exe 1576 reg.exe 1796 reg.exe 1244 reg.exe 2188 reg.exe 2908 reg.exe 1480 reg.exe 2704 reg.exe 320 reg.exe 1516 reg.exe 2284 reg.exe 2796 reg.exe 2100 reg.exe 2468 reg.exe 2608 reg.exe 1644 reg.exe 2124 reg.exe 2444 reg.exe 1868 reg.exe 1704 reg.exe 2452 reg.exe 2332 reg.exe 1720 reg.exe 2748 reg.exe 2904 reg.exe 1568 reg.exe 2520 reg.exe 1824 reg.exe 1612 reg.exe 2772 reg.exe 1924 reg.exe 2412 reg.exe 684 reg.exe 2664 reg.exe 588 reg.exe 324 reg.exe 2060 reg.exe 1988 reg.exe 312 reg.exe 2776 reg.exe 2136 reg.exe 1620 reg.exe 3012 reg.exe 1748 reg.exe 2920 reg.exe 1520 reg.exe 2316 reg.exe 1772 reg.exe 2332 reg.exe 2584 reg.exe 1044 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2780 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2780 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 860 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 860 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 584 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 584 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 964 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 964 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 896 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 896 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2736 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2736 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 908 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 908 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2808 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2808 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2004 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2004 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1620 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1620 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1608 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1608 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2876 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2876 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2864 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2864 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1764 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1764 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2808 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2808 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2944 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2944 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 3012 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 3012 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1508 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1508 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2864 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2864 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1828 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1828 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1496 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1496 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2352 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2352 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 3048 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 3048 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2576 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2576 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2000 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2000 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 696 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 696 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2140 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2140 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1688 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 1688 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2316 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 2316 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1136 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 28 PID 2240 wrote to memory of 1136 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 28 PID 2240 wrote to memory of 1136 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 28 PID 2240 wrote to memory of 1136 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 28 PID 2240 wrote to memory of 2620 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2620 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2620 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2620 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 29 PID 2240 wrote to memory of 2568 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2568 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2568 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 30 PID 2240 wrote to memory of 2568 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 30 PID 2568 wrote to memory of 2592 2568 cmd.exe 33 PID 2568 wrote to memory of 2592 2568 cmd.exe 33 PID 2568 wrote to memory of 2592 2568 cmd.exe 33 PID 2568 wrote to memory of 2592 2568 cmd.exe 33 PID 2240 wrote to memory of 2884 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2884 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2884 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2884 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 32 PID 2240 wrote to memory of 2284 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 34 PID 2240 wrote to memory of 2284 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 34 PID 2240 wrote to memory of 2284 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 34 PID 2240 wrote to memory of 2284 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 34 PID 2240 wrote to memory of 2564 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 35 PID 2240 wrote to memory of 2564 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 35 PID 2240 wrote to memory of 2564 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 35 PID 2240 wrote to memory of 2564 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 35 PID 2240 wrote to memory of 2480 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 38 PID 2240 wrote to memory of 2480 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 38 PID 2240 wrote to memory of 2480 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 38 PID 2240 wrote to memory of 2480 2240 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 38 PID 2480 wrote to memory of 2612 2480 cmd.exe 41 PID 2480 wrote to memory of 2612 2480 cmd.exe 41 PID 2480 wrote to memory of 2612 2480 cmd.exe 41 PID 2480 wrote to memory of 2612 2480 cmd.exe 41 PID 2592 wrote to memory of 2624 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 42 PID 2592 wrote to memory of 2624 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 42 PID 2592 wrote to memory of 2624 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 42 PID 2592 wrote to memory of 2624 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 42 PID 2624 wrote to memory of 2780 2624 cmd.exe 44 PID 2624 wrote to memory of 2780 2624 cmd.exe 44 PID 2624 wrote to memory of 2780 2624 cmd.exe 44 PID 2624 wrote to memory of 2780 2624 cmd.exe 44 PID 2592 wrote to memory of 2856 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 45 PID 2592 wrote to memory of 2856 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 45 PID 2592 wrote to memory of 2856 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 45 PID 2592 wrote to memory of 2856 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 45 PID 2592 wrote to memory of 1552 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 46 PID 2592 wrote to memory of 1552 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 46 PID 2592 wrote to memory of 1552 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 46 PID 2592 wrote to memory of 1552 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 46 PID 2592 wrote to memory of 556 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 48 PID 2592 wrote to memory of 556 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 48 PID 2592 wrote to memory of 556 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 48 PID 2592 wrote to memory of 556 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 48 PID 2592 wrote to memory of 1708 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 51 PID 2592 wrote to memory of 1708 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 51 PID 2592 wrote to memory of 1708 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 51 PID 2592 wrote to memory of 1708 2592 1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe 51 PID 1708 wrote to memory of 2416 1708 cmd.exe 53 PID 1708 wrote to memory of 2416 1708 cmd.exe 53 PID 1708 wrote to memory of 2416 1708 cmd.exe 53 PID 1708 wrote to memory of 2416 1708 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\heEsMwEc\egUwIcsE.exe"C:\Users\Admin\heEsMwEc\egUwIcsE.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1136
-
-
C:\ProgramData\OIEwIUow\HeAYEkoA.exe"C:\ProgramData\OIEwIUow\HeAYEkoA.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2620
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
PID:2780 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"6⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:860 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"8⤵PID:564
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"10⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"12⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:896 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"14⤵PID:2156
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"16⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:908 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"18⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"20⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2004 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"22⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"24⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:1608 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"26⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"28⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"30⤵PID:2788
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"32⤵PID:1248
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11833⤵
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"34⤵PID:1060
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11835⤵
- Suspicious behavior: EnumeratesProcesses
PID:2944 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"36⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11837⤵
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"38⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11839⤵
- Suspicious behavior: EnumeratesProcesses
PID:1508 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"40⤵PID:636
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11841⤵
- Suspicious behavior: EnumeratesProcesses
PID:2592 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"42⤵PID:1244
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11843⤵
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"44⤵PID:1520
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11845⤵
- Suspicious behavior: EnumeratesProcesses
PID:1828 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"46⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11847⤵
- Suspicious behavior: EnumeratesProcesses
PID:1496 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"48⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2352 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"50⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11851⤵
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"52⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11853⤵
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"54⤵PID:1836
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11855⤵
- Suspicious behavior: EnumeratesProcesses
PID:2000 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"56⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11857⤵
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"58⤵PID:876
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11859⤵
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"60⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11861⤵
- Suspicious behavior: EnumeratesProcesses
PID:1688 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"62⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11863⤵
- Suspicious behavior: EnumeratesProcesses
PID:2316 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"64⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11865⤵PID:3052
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"66⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11867⤵PID:1192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"68⤵PID:1728
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11869⤵PID:2100
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"70⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11871⤵PID:1788
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"72⤵PID:1032
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11873⤵PID:1652
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"74⤵PID:620
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11875⤵PID:916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"76⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11877⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"78⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11879⤵PID:2324
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"80⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11881⤵PID:2308
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"82⤵PID:2988
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11883⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"84⤵PID:1392
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11885⤵PID:2824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"86⤵PID:1360
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11887⤵PID:660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"88⤵PID:2648
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11889⤵PID:1064
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"90⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11891⤵PID:2588
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"92⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11893⤵PID:1632
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"94⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11895⤵PID:2796
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"96⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11897⤵PID:1916
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"98⤵PID:1284
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes11899⤵PID:1556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"100⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118101⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"102⤵PID:2400
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118103⤵PID:2012
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"104⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118105⤵PID:2908
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"106⤵PID:2932
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118107⤵PID:2252
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"108⤵PID:2608
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118109⤵PID:1960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"110⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118111⤵PID:1752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"112⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118113⤵PID:2824
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"114⤵PID:3000
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118115⤵PID:2436
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"116⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118117⤵PID:1604
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"118⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118119⤵PID:1928
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"120⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118121⤵PID:2232
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\1c323571263fae709a03a787aa4416aa_JaffaCakes118"122⤵PID:860
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-