Analysis
-
max time kernel
54s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18/04/2024, 04:24
Static task
static1
Behavioral task
behavioral1
Sample
f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe
-
Size
436KB
-
MD5
f742a33fcbf2320f16d1bc9ed77c4142
-
SHA1
91404bc7bdfbd38c8ba8b1e443c93e9889ad6db6
-
SHA256
b8c2d66141a7bc1c2e91bf31ea61c6dd9c3cfaac436bd51f8f54f6b8b2831822
-
SHA512
80deef118f8b6059b1a033faf474faf8de4e03ee2fb55e53e4776ca13798ea0443b41d7b62ff17536ed47d1fd255225255e4161aac96bde751c3cf48fb89075f
-
SSDEEP
12288:6y6ff3Sz70R4aHPuWV30jDQNvBc15su/:6pf3SnatHW4wOvBqsK
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 46 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Executes dropped EXE 3 IoCs
pid Process 2680 mogkAwkM.exe 1132 vooUsgMc.exe 2628 kcIowQEQ.exe -
Loads dropped DLL 10 IoCs
pid Process 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2680 mogkAwkM.exe 2680 mogkAwkM.exe 2680 mogkAwkM.exe 2680 mogkAwkM.exe 2680 mogkAwkM.exe 2680 mogkAwkM.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vooUsgMc.exe = "C:\\ProgramData\\xCoMoYME\\vooUsgMc.exe" kcIowQEQ.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\mogkAwkM.exe = "C:\\Users\\Admin\\SywEIEkM\\mogkAwkM.exe" f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-778096762-2241304387-192235952-1000\Software\Microsoft\Windows\CurrentVersion\Run\mogkAwkM.exe = "C:\\Users\\Admin\\SywEIEkM\\mogkAwkM.exe" mogkAwkM.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vooUsgMc.exe = "C:\\ProgramData\\xCoMoYME\\vooUsgMc.exe" f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vooUsgMc.exe = "C:\\ProgramData\\xCoMoYME\\vooUsgMc.exe" vooUsgMc.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\SywEIEkM kcIowQEQ.exe File opened for modification C:\Windows\SysWOW64\config\systemprofile\SywEIEkM\mogkAwkM kcIowQEQ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 64 IoCs
pid Process 2172 reg.exe 2756 reg.exe 1524 reg.exe 2380 reg.exe 1072 reg.exe 3016 reg.exe 2808 reg.exe 3044 reg.exe 644 reg.exe 2416 reg.exe 780 reg.exe 1956 reg.exe 2972 reg.exe 1368 reg.exe 3396 reg.exe 3140 reg.exe 524 reg.exe 2388 reg.exe 1952 reg.exe 3184 reg.exe 3624 reg.exe 1200 reg.exe 788 reg.exe 3664 reg.exe 240 reg.exe 2716 reg.exe 2820 reg.exe 1748 reg.exe 1784 reg.exe 2912 reg.exe 2928 reg.exe 1328 reg.exe 2144 reg.exe 1752 reg.exe 2040 reg.exe 2308 reg.exe 1832 reg.exe 1972 reg.exe 1268 reg.exe 1632 reg.exe 1952 reg.exe 1556 reg.exe 2016 reg.exe 2660 reg.exe 1652 reg.exe 1456 reg.exe 2908 reg.exe 2172 reg.exe 1444 reg.exe 888 reg.exe 1964 reg.exe 2276 reg.exe 240 reg.exe 2572 reg.exe 2268 reg.exe 3544 reg.exe 1556 reg.exe 2476 reg.exe 2972 reg.exe 1608 reg.exe 1152 reg.exe 1944 reg.exe 2540 reg.exe 1716 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2748 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2748 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2024 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2024 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 936 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 936 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2300 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2300 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2888 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2888 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1596 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1596 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2620 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2620 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 760 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 760 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2272 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2272 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2276 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2276 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2904 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2904 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2980 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2980 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2652 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2652 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1056 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1056 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2580 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2580 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2444 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2444 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2248 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2248 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 852 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 852 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2100 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2100 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2660 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2660 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2820 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2820 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2724 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2724 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1200 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1200 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2568 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2568 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 892 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 892 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 940 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 940 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1248 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1248 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 980 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 980 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2480 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 2480 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1948 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 1948 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2180 wrote to memory of 2680 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 28 PID 2180 wrote to memory of 2680 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 28 PID 2180 wrote to memory of 2680 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 28 PID 2180 wrote to memory of 2680 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 28 PID 2180 wrote to memory of 1132 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 29 PID 2180 wrote to memory of 1132 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 29 PID 2180 wrote to memory of 1132 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 29 PID 2180 wrote to memory of 1132 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 29 PID 2180 wrote to memory of 2664 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2664 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2664 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 31 PID 2180 wrote to memory of 2664 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 31 PID 2664 wrote to memory of 2412 2664 cmd.exe 33 PID 2664 wrote to memory of 2412 2664 cmd.exe 33 PID 2664 wrote to memory of 2412 2664 cmd.exe 33 PID 2664 wrote to memory of 2412 2664 cmd.exe 33 PID 2180 wrote to memory of 2420 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2420 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2420 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2420 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 34 PID 2180 wrote to memory of 2432 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 35 PID 2180 wrote to memory of 2432 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 35 PID 2180 wrote to memory of 2432 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 35 PID 2180 wrote to memory of 2432 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 35 PID 2180 wrote to memory of 2476 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2476 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2476 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 36 PID 2180 wrote to memory of 2476 2180 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 36 PID 2412 wrote to memory of 680 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 40 PID 2412 wrote to memory of 680 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 40 PID 2412 wrote to memory of 680 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 40 PID 2412 wrote to memory of 680 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 40 PID 680 wrote to memory of 2748 680 cmd.exe 43 PID 680 wrote to memory of 2748 680 cmd.exe 43 PID 680 wrote to memory of 2748 680 cmd.exe 43 PID 680 wrote to memory of 2748 680 cmd.exe 43 PID 2412 wrote to memory of 820 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 42 PID 2412 wrote to memory of 820 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 42 PID 2412 wrote to memory of 820 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 42 PID 2412 wrote to memory of 820 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 42 PID 2412 wrote to memory of 2688 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 44 PID 2412 wrote to memory of 2688 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 44 PID 2412 wrote to memory of 2688 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 44 PID 2412 wrote to memory of 2688 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 44 PID 2412 wrote to memory of 2756 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 46 PID 2412 wrote to memory of 2756 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 46 PID 2412 wrote to memory of 2756 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 46 PID 2412 wrote to memory of 2756 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 46 PID 2412 wrote to memory of 2824 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 48 PID 2412 wrote to memory of 2824 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 48 PID 2412 wrote to memory of 2824 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 48 PID 2412 wrote to memory of 2824 2412 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 48 PID 2824 wrote to memory of 2172 2824 cmd.exe 51 PID 2824 wrote to memory of 2172 2824 cmd.exe 51 PID 2824 wrote to memory of 2172 2824 cmd.exe 51 PID 2824 wrote to memory of 2172 2824 cmd.exe 51 PID 2748 wrote to memory of 2388 2748 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 52 PID 2748 wrote to memory of 2388 2748 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 52 PID 2748 wrote to memory of 2388 2748 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 52 PID 2748 wrote to memory of 2388 2748 f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe 52 PID 2388 wrote to memory of 2024 2388 cmd.exe 54 PID 2388 wrote to memory of 2024 2388 cmd.exe 54 PID 2388 wrote to memory of 2024 2388 cmd.exe 54 PID 2388 wrote to memory of 2024 2388 cmd.exe 54
Processes
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\SywEIEkM\mogkAwkM.exe"C:\Users\Admin\SywEIEkM\mogkAwkM.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2680
-
-
C:\ProgramData\xCoMoYME\vooUsgMc.exe"C:\ProgramData\xCoMoYME\vooUsgMc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1132
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes1183⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:680 -
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"6⤵
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes1187⤵
- Suspicious behavior: EnumeratesProcesses
PID:2024 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"8⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"10⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:2300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"12⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:2888 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"14⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:1596 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"16⤵PID:2676
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"18⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:760 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"20⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"22⤵PID:960
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"24⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"26⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:2980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"28⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:2652 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"30⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"32⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11833⤵
- Suspicious behavior: EnumeratesProcesses
PID:2580 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"34⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11835⤵
- Suspicious behavior: EnumeratesProcesses
PID:2444 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"36⤵PID:644
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11837⤵
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"38⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11839⤵
- Suspicious behavior: EnumeratesProcesses
PID:852 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"40⤵PID:1700
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11841⤵
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"42⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11843⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"44⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11845⤵
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"46⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11847⤵
- Suspicious behavior: EnumeratesProcesses
PID:2724 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"48⤵PID:2260
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11849⤵
- Suspicious behavior: EnumeratesProcesses
PID:1200 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"50⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11851⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"52⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11853⤵
- Suspicious behavior: EnumeratesProcesses
PID:892 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"54⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11855⤵
- Suspicious behavior: EnumeratesProcesses
PID:940 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"56⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11857⤵
- Suspicious behavior: EnumeratesProcesses
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"58⤵PID:368
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11859⤵
- Suspicious behavior: EnumeratesProcesses
PID:980 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"60⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11861⤵
- Suspicious behavior: EnumeratesProcesses
PID:2480 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"62⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11863⤵
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"64⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11865⤵PID:2156
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"66⤵PID:2200
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11867⤵PID:2152
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"68⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11869⤵PID:2256
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"70⤵PID:764
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11871⤵PID:2752
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"72⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11873⤵PID:484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"74⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11875⤵PID:2124
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"76⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11877⤵PID:2004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"78⤵PID:2056
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11879⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"80⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11881⤵PID:1460
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"82⤵PID:1596
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11883⤵PID:1384
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"84⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11885⤵PID:1544
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"86⤵PID:704
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11887⤵PID:2848
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"88⤵PID:2340
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11889⤵PID:1112
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"90⤵PID:608
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11891⤵PID:1716
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"92⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11893⤵PID:2280
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"94⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11895⤵PID:1192
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"96⤵PID:2964
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11897⤵PID:1564
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"98⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes11899⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"100⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118101⤵PID:2764
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"102⤵PID:2480
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118103⤵PID:2296
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"104⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118105⤵PID:1976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"106⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118107⤵PID:960
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"108⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118109⤵PID:2724
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"110⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118111⤵PID:2108
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"112⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118113⤵PID:2416
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"114⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118115⤵PID:628
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"116⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118117⤵PID:2236
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"118⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118119⤵PID:2904
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"120⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118121⤵PID:1600
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\f742a33fcbf2320f16d1bc9ed77c4142_JaffaCakes118"122⤵PID:2192
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-