Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
04-05-2024 18:03
Static task
static1
Behavioral task
behavioral1
Sample
8814e8781ffe8853730635b9c2023367.jaffacakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8814e8781ffe8853730635b9c2023367.jaffacakes118.exe
Resource
win10v2004-20240419-en
General
-
Target
8814e8781ffe8853730635b9c2023367.jaffacakes118.exe
-
Size
429KB
-
MD5
8814e8781ffe8853730635b9c2023367
-
SHA1
ca0212fd207ec7e3b4ca697087bf4d2a5369f762
-
SHA256
9e095511d206a5c996801a343e5ccd3a17c62bc0f0e051d31f0ca8e862e7c72f
-
SHA512
30fc1b71e3da2020ff408c0bef2e01e425d1681597149a553cd801dc6e61d3f812cf1fd93936df510797364f8f3d75da4a2496a6908c6caf45fa3383baabfca2
-
SSDEEP
6144:it03a62hzpSNxV2qcJVLNyTiY6wDyIJ2r/bKre:Os52hzpHq8eTi30yIQrDKre
Malware Config
Signatures
-
Executes dropped EXE 26 IoCs
pid Process 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 1960 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe 1924 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe 1540 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe 1228 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe 2268 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe 820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe 1100 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe 2356 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe 1524 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe 2588 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202y.exe -
Loads dropped DLL 52 IoCs
pid Process 2164 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe 2164 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 1960 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe 1960 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe 1924 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe 1924 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe 1540 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe 1540 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe 1228 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe 1228 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe 2268 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe 2268 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe 820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe 820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe 1100 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe 1100 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe 2356 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe 2356 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe 1524 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe 1524 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe 2588 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe 2588 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe -
Adds Run key to start application 2 TTPs 26 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Trickler = "\"c:\\users\\admin\\appdata\\local\\temp\\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202y.exe\"" 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe -
Modifies registry class 54 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202y.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C}\uets = 6b11dccbfecbdf8c 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe Key created \REGISTRY\MACHINE\Software\CLASSES\Wow6432Node\CLSID\{21FFB6C0-0DA1-11D5-A9D5-00500413153C} 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2164 wrote to memory of 3036 2164 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe 28 PID 2164 wrote to memory of 3036 2164 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe 28 PID 2164 wrote to memory of 3036 2164 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe 28 PID 2164 wrote to memory of 3036 2164 8814e8781ffe8853730635b9c2023367.jaffacakes118.exe 28 PID 3036 wrote to memory of 2548 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 29 PID 3036 wrote to memory of 2548 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 29 PID 3036 wrote to memory of 2548 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 29 PID 3036 wrote to memory of 2548 3036 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe 29 PID 2548 wrote to memory of 2428 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 30 PID 2548 wrote to memory of 2428 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 30 PID 2548 wrote to memory of 2428 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 30 PID 2548 wrote to memory of 2428 2548 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe 30 PID 2428 wrote to memory of 2508 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 31 PID 2428 wrote to memory of 2508 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 31 PID 2428 wrote to memory of 2508 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 31 PID 2428 wrote to memory of 2508 2428 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe 31 PID 2508 wrote to memory of 2820 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 32 PID 2508 wrote to memory of 2820 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 32 PID 2508 wrote to memory of 2820 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 32 PID 2508 wrote to memory of 2820 2508 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe 32 PID 2820 wrote to memory of 1388 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 33 PID 2820 wrote to memory of 1388 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 33 PID 2820 wrote to memory of 1388 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 33 PID 2820 wrote to memory of 1388 2820 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe 33 PID 1388 wrote to memory of 2704 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 34 PID 1388 wrote to memory of 2704 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 34 PID 1388 wrote to memory of 2704 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 34 PID 1388 wrote to memory of 2704 1388 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe 34 PID 2704 wrote to memory of 1460 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 35 PID 2704 wrote to memory of 1460 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 35 PID 2704 wrote to memory of 1460 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 35 PID 2704 wrote to memory of 1460 2704 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe 35 PID 1460 wrote to memory of 920 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 36 PID 1460 wrote to memory of 920 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 36 PID 1460 wrote to memory of 920 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 36 PID 1460 wrote to memory of 920 1460 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe 36 PID 920 wrote to memory of 2364 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 37 PID 920 wrote to memory of 2364 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 37 PID 920 wrote to memory of 2364 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 37 PID 920 wrote to memory of 2364 920 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe 37 PID 2364 wrote to memory of 1656 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 38 PID 2364 wrote to memory of 1656 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 38 PID 2364 wrote to memory of 1656 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 38 PID 2364 wrote to memory of 1656 2364 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe 38 PID 1656 wrote to memory of 1652 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 39 PID 1656 wrote to memory of 1652 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 39 PID 1656 wrote to memory of 1652 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 39 PID 1656 wrote to memory of 1652 1656 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe 39 PID 1652 wrote to memory of 1424 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 40 PID 1652 wrote to memory of 1424 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 40 PID 1652 wrote to memory of 1424 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 40 PID 1652 wrote to memory of 1424 1652 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe 40 PID 1424 wrote to memory of 2484 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 41 PID 1424 wrote to memory of 2484 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 41 PID 1424 wrote to memory of 2484 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 41 PID 1424 wrote to memory of 2484 1424 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe 41 PID 2484 wrote to memory of 2812 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 42 PID 2484 wrote to memory of 2812 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 42 PID 2484 wrote to memory of 2812 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 42 PID 2484 wrote to memory of 2812 2484 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe 42 PID 2812 wrote to memory of 1960 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 43 PID 2812 wrote to memory of 1960 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 43 PID 2812 wrote to memory of 1960 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 43 PID 2812 wrote to memory of 1960 2812 8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\8814e8781ffe8853730635b9c2023367.jaffacakes118.exe"C:\Users\Admin\AppData\Local\Temp\8814e8781ffe8853730635b9c2023367.jaffacakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2164 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3036 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202a.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2548 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202b.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2428 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202c.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2508 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202d.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2820 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202e.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1388 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202f.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2704 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202g.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1460 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202h.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:920 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202i.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2364 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202j.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1656 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202k.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1652 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202l.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1424 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202m.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202n.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2812 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202o.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1960 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202p.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1924 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202q.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1540 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202r.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1228 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202s.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2268 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202t.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:820 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202u.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1100 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202v.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2356 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202w.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:1524 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202x.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Modifies registry class
PID:2588 -
\??\c:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202y.exec:\users\admin\appdata\local\temp\8814e8781ffe8853730635b9c2023367.jaffacakes118_3202y.exe27⤵
- Executes dropped EXE
- Modifies registry class
PID:3036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
430KB
MD5dc7b03dbc001f486b5e833049cee45e7
SHA1c00de76e73eedbf0a2bd25636654378774f4c061
SHA256e638e8321d9b138f5394c64408ff851384e713601428e7bd202729ecd58b7db6
SHA512e5a0c95c8d30bbc467afeea8159ac191ab55637938692fb5d05b1971fc59628f9dd7c25951f8d81e151ce3195fb07e343608f166c87174eae54ae7519f96224f
-
Filesize
433KB
MD55bc6390867bea4c0e075534481be643f
SHA133d2bd71a462a1af4cab71ada7f418721c61e213
SHA256a4d3e553f32be42f4cc746b65092ef77d257990c2c661ad6cc2ea4e0c8f4648a
SHA5125d637b41910cb1bc99f6a4e5aa93aecfaf0834a5594abc28aa3e4faa649d0205acbcff867465250e1d63032d861de7c5e1ac9475678890d48560af18eb76b253
-
Filesize
431KB
MD54562120e6d0671d60527ecde5fd329ed
SHA143587f2ecf5e63da9a6bb371064d24c6f4cac6b1
SHA256a04d0b2faa27bd7e59fee5bd1684fc2b35544d861b5a5f3f070d2104befa9124
SHA5129299c96b819ac22d7cce4113510f64967335b0b01ebdc1c6f972c848922052fbf73c390d0d3ed0a775db55ea7b3ed86ad760119e54adb2583a962bbabed1ad58
-
Filesize
432KB
MD520563ec87058a51dda183f2a95cc8f7e
SHA1ed6ab6f3481db1bf560e0552ebe18847d81bf276
SHA256fd8b6950550a2bc4bfc062e828c5728612d3d4595a37f30fdd63d463ffeb72f7
SHA5124b74357e3b618a980d20959fe74145e8fd30c790b133b94fbf1ee146419b8d145dbaa0d763aec7cd3fd682a563824472d43ec04c6630e358c0ba5b32b00f50e3
-
Filesize
432KB
MD5b1e001976dece3cbd1c93ece33534ddc
SHA10087a4a7594818f5fea3db642c156691e0911bba
SHA2565e50490bd8d049bae3c2a4f339cc4d7b4e9a069b3ad7c99ec5973504850f10f6
SHA512411ae2d21e5de5dc0db9b38a6c61bff07b2cc586b0f31f0287ec125316b3f1db2b6a843f50f55c3ffa2d96f191c54b0c84b7e605f36142888d9c63b05677c812
-
Filesize
432KB
MD5821850a72aeec5cfb0139229bc10a88f
SHA1aa82f50f3753be4eea3e9163c9e2079186c3e601
SHA256afa2cc5ff4d4ff8539fb172f3cc9099fc3c0178d386358944f8d6d3397b71261
SHA512f0f80cf34db96fdea819b68a1b9d0be1c0e7b89ba96da7269b2815619223fc431a0ff3af137ecc9f66f4a584436926abb41e099263a9d41ab60326d8c704d169
-
Filesize
433KB
MD53509d38a3b875bebf163942645716e44
SHA16457d3c595ce83255044aa84f67488fea45ca887
SHA256b986a8701bb5317874e21060e1a05f3e97057f150f91623c82a6c1a2516db20a
SHA512a592b26dcebb8090596f3f1721c428e1c82320c5604f4a96988078f43a091159f939cc794a0afcadd38d6041a47c9a92afe0dd82a8c7954026ec68fbb70a0898
-
Filesize
430KB
MD5c546f96a52d821504b752984e5a202bc
SHA1c4dfc07c2bee7e7d98f48a23b7114a4a185f308c
SHA256b00a948b3c17ecd585354d108486cc3425df85f6709ed195f555d80992e26d52
SHA51252c383fd42645c573bcdc85712cac182f37b7b12d9364addd37f039e891e6040166af7a1d82b5ddace634bf8206e2c7c14731b60371cf7ee3e65bf825d983928
-
Filesize
430KB
MD566313f4ef4d9cc32535259e3ff8bace7
SHA198c2120fb9f6377204ad51a7afad8226a0ce9477
SHA2560dfa745076f3d913f9af9b428b180a2e1ff578060b685b66d53be687c3310897
SHA512d933a05ffa5a911a422e974a3a46f4fd556e78c75a11fb647d4f19cde06dc98cba5e1817caca18a553c54a6a92bb9fe1b09510ad2f0f9ce3f6ee8ae179e65ee7
-
Filesize
430KB
MD55a0d53d8e839b305d4359648bef5741c
SHA18e389457e5f14acde1ae4c34491768e5e7be6dcf
SHA2560d226859fad56ec1656d8ad8230c0932c28f138c2a6772fd6e7999ff87b602c8
SHA51267a6079752f02130e3f0b27f1a24ee0cd57c58e8f4074322e6a4605fdca88cf2deb276b424423503374b1ef003214b5386fad809062bc6387c600ce4114e5ee6
-
Filesize
430KB
MD5ecbb7b3017b972b476e470899ed8db7d
SHA110feb13fb88001edaf51be2e1cf856ccb3b4f63c
SHA25655599b958194d741bddae55222658a858499704ce18c5ab9cc4884a46e86347c
SHA5122976664c50ad323c938a0cf7b4e43934b2abcfdb1d1282e264f32026a1f61ab7781b9b64b7dc482481bfbc64f56bc56e35072fda0dd628fc563ed434d1697c5e
-
Filesize
431KB
MD533d1f1e11bd2413f433004a33d9f7d1a
SHA178920d047afcaacdaa28bfb927a12145d4e597ac
SHA256d7f5b7befd3d1e0e6295d3947136ea759c50fe4d66470ff78ee50845714aa881
SHA5123dfc0f1f2e3b278106ef8269f9a4d8302eac749747eedc9c48e1be41da5ba2cf19c6cbc3e523fc8413f5d0e8ec816dbc1eda06da2263346dd3ca90558ba31e40
-
Filesize
431KB
MD535b72c9b146d0b486f8135d9b6572a91
SHA1d3f5b9aaf30a65fda11fe6f3705bda12590b37e0
SHA2562f9d6238d65efa0796021d717dab03dc99e84a1eed4157898e485240b4fa94a4
SHA512cd17fd51cd35e4fe90a698d2052701b894465d1a6212b2350ff8a9ad571a4d95ca6a74267c34db4ce63b14a9449399276737c08ef7ad28310e5cad1300e0f19a
-
Filesize
431KB
MD59bf07ff75435072841ae734b53a49fda
SHA16c7e3f85e22c5cb3dc20b9b7a32d09cf63c24600
SHA256744479871399c89543a16f5fc51d467b239bdccc7b2bd6d152796ffd120589b6
SHA512a9d459e056b89f31be4726c6658d4532a01810cbf409e3902d2d747479077d7fdf83580c56dbe7ed554ed2a7e21cbc04a60f0a82aed48293cbd1ae2eaf5953cf
-
Filesize
432KB
MD532e5d8de50e0f2c8494815fad4333711
SHA19b0556ce31937296eff167bfddbe3e28646999e5
SHA25692ccc8b0b22dd38fcb3709654e8b5fb3002b676ef3e35428208a686f00b9f5bf
SHA512cfe4a0f3716fe56bfc02cdc783ab9372320bac1361883d4304200516ea338bd1bc355d59ee99233817d1fe773193e7556e9a435b5ddafe8379a99e92c6004c0d
-
Filesize
433KB
MD576cfe3c792d96627ab080550f3f7b33e
SHA1c8b42096c31fc6ac91380b659c37bf3e3b63fd88
SHA256243d523c2f9336f6841b46f81143f3e0b87051ab778a368e39a6821f16ecd879
SHA5129b8d685eef4ad290287f356d290efd842cbee8315fcb680e46bb5d3c3ef8d155c9c015d45ec6b4aa3a7edb1df9b9d0b1b42eb6d122c1d066010ffd4c2d3b4094