Analysis
-
max time kernel
145s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18/04/2024, 14:33
Static task
static1
Behavioral task
behavioral1
Sample
f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe
-
Size
37KB
-
MD5
f832f9f0afe3d12157a846a12a0f3957
-
SHA1
e5bec442e880bbf8a7f4cb4ced9268b5b26898d2
-
SHA256
0b7cd3c23befba454245837fe294516f69893d1b9e1d573cc8880a7e6ea433a3
-
SHA512
c9aef4e722711fcfa95781b966a0c1bcd1de46ccfa220523dd2a021b04ef86f2ff941536a4dfd92d1b5c1c434ae86e792cf028c838f0fd6b9618b36dd3097b74
-
SSDEEP
768:hTiyQ2xFxT+5qKjOFQ5Y5f9/Ers4R/Lv5ToxRCNCa/ZqmCo6ppB1xKUyHl8nyX:FiyzxFpUjd08lRLv5OrppRKUyxX
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1132431369-515282257-1998160155-1000\Control Panel\International\Geo\Nation hwzqqhx_retail.exe -
Executes dropped EXE 64 IoCs
pid Process 1864 hwzqqhx_retail.exe 4716 bobo.exe 2168 RAV0142.exe 1028 RAV0142.exe 628 RAV0142.exe 3252 RAV0142.exe 1236 RAV0142.exe 4884 RAV0142.exe 2068 RAV0142.exe 5112 RAV0142.exe 4220 RAV0142.exe 4520 RAV0142.exe 388 RAV0142.exe 1860 RAV0142.exe 4756 RAV0142.exe 1724 RAV0142.exe 1500 RAV0142.exe 4432 RAV0142.exe 2528 RAV0142.exe 2788 RAV0142.exe 2908 RAV0142.exe 3316 RAV0142.exe 3620 RAV0142.exe 4472 RAV0142.exe 3696 RAV0142.exe 2424 RAV0142.exe 1988 RAV0142.exe 5056 RAV0142.exe 5060 RAV0142.exe 3052 RAV0142.exe 3512 RAV0142.exe 5028 RAV0142.exe 2224 RAV0142.exe 1732 RAV0142.exe 3496 RAV0142.exe 4544 RAV0142.exe 4316 RAV0142.exe 3608 RAV0142.exe 3704 RAV0142.exe 1464 RAV0142.exe 4976 RAV0142.exe 4412 RAV0142.exe 1700 RAV0142.exe 1808 RAV0142.exe 4796 RAV0142.exe 3728 RAV0142.exe 4468 RAV0142.exe 1868 RAV0142.exe 4940 RAV0142.exe 2476 RAV0142.exe 5076 RAV0142.exe 1864 RAV0142.exe 4104 RAV0142.exe 556 RAV0142.exe 1812 RAV0142.exe 2296 RAV0142.exe 2024 RAV0142.exe 5024 RAV0142.exe 1356 RAV0142.exe 700 RAV0142.exe 3208 RAV0142.exe 716 RAV0142.exe 1264 RAV0142.exe 3476 RAV0142.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\RAV0142 = "C:\\Windows\\system32\\RAV0142.exe" RAV0142.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\wiytd.dll hwzqqhx_retail.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe File created C:\Windows\SysWOW64\RAV0142.exe RAV0142.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8E0E3BA-D55F-4A08-8EE4-0A59E0284124}\InProcServer32\ThreadingModel = "Apartment" hwzqqhx_retail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8E0E3BA-D55F-4A08-8EE4-0A59E0284124} hwzqqhx_retail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8E0E3BA-D55F-4A08-8EE4-0A59E0284124}\ = "Microsoft Data Tools Query Designe" hwzqqhx_retail.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8E0E3BA-D55F-4A08-8EE4-0A59E0284124}\InProcServer32 hwzqqhx_retail.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{D8E0E3BA-D55F-4A08-8EE4-0A59E0284124}\InProcServer32\ = "C:\\Windows\\SysWow64\\Agent.dll" hwzqqhx_retail.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4716 bobo.exe 4716 bobo.exe 2168 RAV0142.exe 2168 RAV0142.exe 1028 RAV0142.exe 1028 RAV0142.exe 628 RAV0142.exe 628 RAV0142.exe 3252 RAV0142.exe 3252 RAV0142.exe 1236 RAV0142.exe 1236 RAV0142.exe 4884 RAV0142.exe 4884 RAV0142.exe 2068 RAV0142.exe 2068 RAV0142.exe 5112 RAV0142.exe 5112 RAV0142.exe 4220 RAV0142.exe 4220 RAV0142.exe 4520 RAV0142.exe 4520 RAV0142.exe 388 RAV0142.exe 388 RAV0142.exe 1860 RAV0142.exe 1860 RAV0142.exe 4756 RAV0142.exe 4756 RAV0142.exe 1724 RAV0142.exe 1724 RAV0142.exe 1500 RAV0142.exe 1500 RAV0142.exe 4432 RAV0142.exe 4432 RAV0142.exe 2528 RAV0142.exe 2528 RAV0142.exe 2788 RAV0142.exe 2788 RAV0142.exe 2908 RAV0142.exe 2908 RAV0142.exe 3316 RAV0142.exe 3316 RAV0142.exe 3620 RAV0142.exe 3620 RAV0142.exe 4472 RAV0142.exe 4472 RAV0142.exe 3696 RAV0142.exe 3696 RAV0142.exe 2424 RAV0142.exe 2424 RAV0142.exe 1988 RAV0142.exe 1988 RAV0142.exe 5056 RAV0142.exe 5056 RAV0142.exe 5060 RAV0142.exe 5060 RAV0142.exe 3052 RAV0142.exe 3052 RAV0142.exe 3512 RAV0142.exe 3512 RAV0142.exe 5028 RAV0142.exe 5028 RAV0142.exe 2224 RAV0142.exe 2224 RAV0142.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeBackupPrivilege 1864 hwzqqhx_retail.exe Token: SeRestorePrivilege 1864 hwzqqhx_retail.exe Token: SeBackupPrivilege 1864 hwzqqhx_retail.exe Token: SeRestorePrivilege 1864 hwzqqhx_retail.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4864 wrote to memory of 1864 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 87 PID 4864 wrote to memory of 1864 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 87 PID 4864 wrote to memory of 1864 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 87 PID 4864 wrote to memory of 4716 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 89 PID 4864 wrote to memory of 4716 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 89 PID 4864 wrote to memory of 4716 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 89 PID 4716 wrote to memory of 2168 4716 bobo.exe 90 PID 4716 wrote to memory of 2168 4716 bobo.exe 90 PID 4716 wrote to memory of 2168 4716 bobo.exe 90 PID 4864 wrote to memory of 1328 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 92 PID 4864 wrote to memory of 1328 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 92 PID 4864 wrote to memory of 1328 4864 f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe 92 PID 2168 wrote to memory of 1028 2168 RAV0142.exe 91 PID 2168 wrote to memory of 1028 2168 RAV0142.exe 91 PID 2168 wrote to memory of 1028 2168 RAV0142.exe 91 PID 1028 wrote to memory of 628 1028 RAV0142.exe 94 PID 1028 wrote to memory of 628 1028 RAV0142.exe 94 PID 1028 wrote to memory of 628 1028 RAV0142.exe 94 PID 628 wrote to memory of 3252 628 RAV0142.exe 95 PID 628 wrote to memory of 3252 628 RAV0142.exe 95 PID 628 wrote to memory of 3252 628 RAV0142.exe 95 PID 3252 wrote to memory of 1236 3252 RAV0142.exe 96 PID 3252 wrote to memory of 1236 3252 RAV0142.exe 96 PID 3252 wrote to memory of 1236 3252 RAV0142.exe 96 PID 1864 wrote to memory of 3592 1864 hwzqqhx_retail.exe 98 PID 1864 wrote to memory of 3592 1864 hwzqqhx_retail.exe 98 PID 1864 wrote to memory of 3592 1864 hwzqqhx_retail.exe 98 PID 1236 wrote to memory of 4884 1236 RAV0142.exe 97 PID 1236 wrote to memory of 4884 1236 RAV0142.exe 97 PID 1236 wrote to memory of 4884 1236 RAV0142.exe 97 PID 4884 wrote to memory of 2068 4884 RAV0142.exe 99 PID 4884 wrote to memory of 2068 4884 RAV0142.exe 99 PID 4884 wrote to memory of 2068 4884 RAV0142.exe 99 PID 2068 wrote to memory of 5112 2068 RAV0142.exe 101 PID 2068 wrote to memory of 5112 2068 RAV0142.exe 101 PID 2068 wrote to memory of 5112 2068 RAV0142.exe 101 PID 5112 wrote to memory of 4220 5112 RAV0142.exe 102 PID 5112 wrote to memory of 4220 5112 RAV0142.exe 102 PID 5112 wrote to memory of 4220 5112 RAV0142.exe 102 PID 4220 wrote to memory of 4520 4220 RAV0142.exe 103 PID 4220 wrote to memory of 4520 4220 RAV0142.exe 103 PID 4220 wrote to memory of 4520 4220 RAV0142.exe 103 PID 4520 wrote to memory of 388 4520 RAV0142.exe 104 PID 4520 wrote to memory of 388 4520 RAV0142.exe 104 PID 4520 wrote to memory of 388 4520 RAV0142.exe 104 PID 388 wrote to memory of 1860 388 RAV0142.exe 105 PID 388 wrote to memory of 1860 388 RAV0142.exe 105 PID 388 wrote to memory of 1860 388 RAV0142.exe 105 PID 1860 wrote to memory of 4756 1860 RAV0142.exe 106 PID 1860 wrote to memory of 4756 1860 RAV0142.exe 106 PID 1860 wrote to memory of 4756 1860 RAV0142.exe 106 PID 4756 wrote to memory of 1724 4756 RAV0142.exe 107 PID 4756 wrote to memory of 1724 4756 RAV0142.exe 107 PID 4756 wrote to memory of 1724 4756 RAV0142.exe 107 PID 1724 wrote to memory of 1500 1724 RAV0142.exe 108 PID 1724 wrote to memory of 1500 1724 RAV0142.exe 108 PID 1724 wrote to memory of 1500 1724 RAV0142.exe 108 PID 1500 wrote to memory of 4432 1500 RAV0142.exe 109 PID 1500 wrote to memory of 4432 1500 RAV0142.exe 109 PID 1500 wrote to memory of 4432 1500 RAV0142.exe 109 PID 4432 wrote to memory of 2528 4432 RAV0142.exe 110 PID 4432 wrote to memory of 2528 4432 RAV0142.exe 110 PID 4432 wrote to memory of 2528 4432 RAV0142.exe 110 PID 2528 wrote to memory of 2788 2528 RAV0142.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f832f9f0afe3d12157a846a12a0f3957_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Users\Admin\AppData\Local\Temp\hwzqqhx_retail.exe"C:\Users\Admin\AppData\Local\Temp\hwzqqhx_retail.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Windows\system32\$$tmp.bat" "3⤵PID:3592
-
-
-
C:\Users\Admin\AppData\Local\Temp\bobo.exe"C:\Users\Admin\AppData\Local\Temp\bobo.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4716 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1028 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4520 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:388 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1500 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2788 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2908 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3316 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3620 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe24⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4472 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3696 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe26⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2424 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe27⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1988 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe28⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5056 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5060 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe30⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3052 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3512 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe32⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:5028 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe33⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2224 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe34⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe35⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe36⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe37⤵
- Executes dropped EXE
PID:4316 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe38⤵
- Executes dropped EXE
PID:3608 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe39⤵
- Executes dropped EXE
PID:3704 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe40⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe41⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe42⤵
- Executes dropped EXE
PID:4412 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe43⤵
- Executes dropped EXE
PID:1700 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe44⤵
- Executes dropped EXE
PID:1808 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe45⤵
- Executes dropped EXE
PID:4796 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe46⤵
- Executes dropped EXE
PID:3728 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe47⤵
- Executes dropped EXE
PID:4468 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe48⤵
- Executes dropped EXE
PID:1868 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4940 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe50⤵
- Executes dropped EXE
PID:2476 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe51⤵
- Executes dropped EXE
PID:5076 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe52⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe53⤵
- Executes dropped EXE
PID:4104 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe54⤵
- Executes dropped EXE
PID:556 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe55⤵
- Executes dropped EXE
PID:1812 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe56⤵
- Executes dropped EXE
PID:2296 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe57⤵
- Executes dropped EXE
PID:2024 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe58⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe59⤵
- Executes dropped EXE
PID:1356 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe60⤵
- Executes dropped EXE
PID:700 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe61⤵
- Executes dropped EXE
PID:3208 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe62⤵
- Executes dropped EXE
PID:716 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe63⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1264 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe64⤵
- Executes dropped EXE
PID:3476 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe65⤵PID:4932
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe66⤵PID:4324
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe67⤵PID:4808
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe68⤵
- Adds Run key to start application
PID:2260 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe69⤵PID:4668
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe70⤵PID:2756
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe71⤵PID:4144
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe72⤵
- Adds Run key to start application
PID:5144 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe73⤵
- Adds Run key to start application
PID:5164 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe74⤵PID:5184
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe75⤵PID:5204
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe76⤵PID:5220
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe77⤵PID:5244
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe78⤵
- Adds Run key to start application
PID:5264 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe79⤵PID:5292
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe80⤵
- Adds Run key to start application
PID:5320 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe81⤵PID:5344
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe82⤵PID:5368
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe83⤵PID:5392
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe84⤵PID:5420
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe85⤵PID:5440
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe86⤵PID:5464
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe87⤵PID:5480
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe88⤵PID:5504
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe89⤵PID:5520
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe90⤵
- Adds Run key to start application
PID:5548 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe91⤵PID:5572
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe92⤵PID:5612
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe93⤵
- Adds Run key to start application
PID:5640 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe94⤵PID:5656
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe95⤵PID:5676
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe96⤵PID:5700
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe97⤵PID:5720
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe98⤵
- Drops file in System32 directory
PID:5740 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe99⤵PID:5760
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe100⤵PID:5780
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe101⤵PID:5800
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe102⤵PID:5820
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe103⤵PID:5840
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe104⤵PID:5860
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe105⤵PID:5880
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe106⤵PID:5900
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe107⤵PID:5920
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe108⤵PID:5940
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe109⤵PID:5964
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe110⤵PID:5984
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe111⤵PID:6000
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe112⤵
- Adds Run key to start application
PID:6020 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe113⤵PID:6040
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe114⤵PID:6064
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe115⤵PID:6084
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe116⤵
- Drops file in System32 directory
PID:6100 -
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe117⤵PID:6124
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe118⤵PID:408
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe119⤵PID:6160
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe120⤵PID:6184
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe121⤵PID:6204
-
C:\Windows\SysWOW64\RAV0142.exeC:\Windows\system32\RAV0142.exe122⤵
- Drops file in System32 directory
PID:6228
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-