Analysis
-
max time kernel
150s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
23-05-2024 15:14
Static task
static1
Behavioral task
behavioral1
Sample
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe
Resource
win10v2004-20240426-en
General
-
Target
6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe
-
Size
283KB
-
MD5
6b5a574c81822c806e598fde5aad93fc
-
SHA1
afbdd84b379d5c392674f2a54bedf01f6f7f9f2b
-
SHA256
fc69f372117af1a15837fd6a490ae821a91db40907f524d91d9003ea719fa8aa
-
SHA512
5ac96dc5046f8408575c6f620129d4d211be178633ba405e20a0a329780c816396bc8ec41a277c09928cb37778fbf6fcf574539d268269ac26261d7ae7ea3cff
-
SSDEEP
6144:AoMdUh1RXAi/q7KtrDTWXWQGaeyLl2HWYkgSEXMEV9p:AjwJWX55mk
Malware Config
Extracted
netwire
185.163.100.6:111
-
activex_autorun
true
-
activex_key
{446644VO-124I-732R-6QR3-BBYQ1W40UCW2}
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
true
-
mutex
YSxJvAQj
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
true
Signatures
-
NetWire RAT payload 64 IoCs
resource yara_rule behavioral2/memory/4040-3-0x00000000023F0000-0x000000000243A000-memory.dmp netwire behavioral2/memory/2052-13-0x0000000005190000-0x00000000051DA000-memory.dmp netwire behavioral2/memory/4916-16-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4916-21-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4916-19-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1572-37-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/2152-51-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4108-73-0x0000000005760000-0x00000000057AA000-memory.dmp netwire behavioral2/memory/412-109-0x00000000049B0000-0x00000000049FA000-memory.dmp netwire behavioral2/memory/2760-124-0x0000000004B60000-0x0000000004BAA000-memory.dmp netwire behavioral2/memory/4204-146-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/1312-175-0x0000000000400000-0x000000000042C000-memory.dmp netwire behavioral2/memory/4960-176-0x00000000058D0000-0x000000000591A000-memory.dmp netwire behavioral2/memory/472-219-0x00000000048D0000-0x000000000491A000-memory.dmp netwire behavioral2/memory/2364-250-0x0000000002870000-0x00000000028BA000-memory.dmp netwire behavioral2/memory/1048-256-0x0000000003070000-0x00000000030BA000-memory.dmp netwire behavioral2/memory/1456-271-0x00000000033C0000-0x000000000340A000-memory.dmp netwire behavioral2/memory/4064-293-0x0000000005660000-0x00000000056AA000-memory.dmp netwire behavioral2/memory/1440-303-0x00000000024C0000-0x000000000250A000-memory.dmp netwire behavioral2/memory/1032-337-0x0000000002E70000-0x0000000002EBA000-memory.dmp netwire behavioral2/memory/1172-396-0x0000000004B90000-0x0000000004BDA000-memory.dmp netwire behavioral2/memory/3936-416-0x0000000005190000-0x00000000051DA000-memory.dmp netwire behavioral2/memory/4308-440-0x0000000004EE0000-0x0000000004F2A000-memory.dmp netwire behavioral2/memory/1280-446-0x0000000003170000-0x00000000031BA000-memory.dmp netwire behavioral2/memory/4164-475-0x0000000002730000-0x000000000277A000-memory.dmp netwire behavioral2/memory/2460-511-0x0000000005810000-0x000000000585A000-memory.dmp netwire behavioral2/memory/3700-540-0x00000000053D0000-0x000000000541A000-memory.dmp netwire behavioral2/memory/4132-555-0x0000000004A20000-0x0000000004A6A000-memory.dmp netwire behavioral2/memory/2772-626-0x0000000000D30000-0x0000000000D7A000-memory.dmp netwire behavioral2/memory/4508-636-0x0000000004BA0000-0x0000000004BEA000-memory.dmp netwire behavioral2/memory/2388-686-0x00000000024C0000-0x000000000250A000-memory.dmp netwire behavioral2/memory/936-701-0x0000000004960000-0x00000000049AA000-memory.dmp netwire behavioral2/memory/3632-707-0x0000000002470000-0x00000000024BA000-memory.dmp netwire behavioral2/memory/672-736-0x0000000005620000-0x000000000566A000-memory.dmp netwire behavioral2/memory/4860-772-0x0000000004990000-0x00000000049DA000-memory.dmp netwire behavioral2/memory/412-775-0x0000000004E10000-0x0000000004E5A000-memory.dmp netwire behavioral2/memory/936-783-0x0000000002440000-0x000000000248A000-memory.dmp netwire behavioral2/memory/1756-812-0x00000000025A0000-0x00000000025EA000-memory.dmp netwire behavioral2/memory/2812-820-0x0000000004C40000-0x0000000004C8A000-memory.dmp netwire behavioral2/memory/2052-856-0x0000000004D40000-0x0000000004D8A000-memory.dmp netwire behavioral2/memory/2776-869-0x0000000002DD0000-0x0000000002E1A000-memory.dmp netwire behavioral2/memory/1804-956-0x0000000002F20000-0x0000000002F6A000-memory.dmp netwire behavioral2/memory/1484-959-0x0000000004FB0000-0x0000000004FFA000-memory.dmp netwire behavioral2/memory/2716-1009-0x0000000002C10000-0x0000000002C5A000-memory.dmp netwire behavioral2/memory/2628-1064-0x0000000002A60000-0x0000000002AAA000-memory.dmp netwire behavioral2/memory/4980-1095-0x0000000002420000-0x000000000246A000-memory.dmp netwire behavioral2/memory/1600-1143-0x0000000004A00000-0x0000000004A4A000-memory.dmp netwire behavioral2/memory/4552-1165-0x00000000028C0000-0x000000000290A000-memory.dmp netwire behavioral2/memory/4136-1173-0x0000000002FE0000-0x000000000302A000-memory.dmp netwire behavioral2/memory/4684-1190-0x0000000004FE0000-0x000000000502A000-memory.dmp netwire behavioral2/memory/956-1275-0x00000000054D0000-0x000000000551A000-memory.dmp netwire behavioral2/memory/3660-1290-0x0000000004B40000-0x0000000004B8A000-memory.dmp netwire behavioral2/memory/4408-1338-0x0000000002230000-0x000000000227A000-memory.dmp netwire behavioral2/memory/2852-1348-0x0000000001E10000-0x0000000001E5A000-memory.dmp netwire behavioral2/memory/1820-1363-0x0000000004C30000-0x0000000004C7A000-memory.dmp netwire behavioral2/memory/1740-1467-0x0000000002DA0000-0x0000000002DEA000-memory.dmp netwire behavioral2/memory/3732-1477-0x0000000005100000-0x000000000514A000-memory.dmp netwire behavioral2/memory/1704-1490-0x0000000002B60000-0x0000000002BAA000-memory.dmp netwire behavioral2/memory/2772-1500-0x0000000004ED0000-0x0000000004F1A000-memory.dmp netwire behavioral2/memory/3332-1515-0x0000000002410000-0x000000000245A000-memory.dmp netwire behavioral2/memory/1628-1668-0x0000000002830000-0x000000000287A000-memory.dmp netwire behavioral2/memory/1696-1727-0x0000000002BB0000-0x0000000002BFA000-memory.dmp netwire behavioral2/memory/2364-1775-0x00000000014D0000-0x000000000151A000-memory.dmp netwire behavioral2/memory/3664-1904-0x0000000002540000-0x000000000258A000-memory.dmp netwire -
Executes dropped EXE 64 IoCs
pid Process 2052 file.exe 4916 file.exe 1620 Host.exe 4504 file.exe 1572 file.exe 1544 Host.exe 1704 file.exe 2152 file.exe 2004 Host.exe 4460 file.exe 696 file.exe 2788 Host.exe 4108 file.exe 4312 file.exe 4652 Host.exe 3632 file.exe 4164 file.exe 4708 Host.exe 1136 file.exe 4220 file.exe 412 Host.exe 3260 file.exe 4968 file.exe 3824 file.exe 2760 Host.exe 3704 file.exe 4444 file.exe 2756 Host.exe 2008 file.exe 4204 file.exe 2024 Host.exe 4040 file.exe 4172 file.exe 2196 Host.exe 1116 file.exe 1860 file.exe 5040 Host.exe 1424 file.exe 1312 file.exe 4960 Host.exe 2760 file.exe 4036 file.exe 3004 Host.exe 2008 file.exe 3524 file.exe 4500 Host.exe 660 file.exe 4908 file.exe 4628 Host.exe 1116 file.exe 2968 file.exe 3356 file.exe 4832 Host.exe 3212 file.exe 4980 file.exe 4108 Host.exe 4332 file.exe 4924 file.exe 3168 file.exe 4312 file.exe 472 Host.exe 2064 file.exe 628 file.exe 4796 file.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" Process not Found Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Upd = "cmd /c type C:\\Users\\Admin\\AppData\\Local\\Temp\\Upd.txt | cmd" reg.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2052 set thread context of 4916 2052 file.exe 93 PID 4504 set thread context of 1572 4504 file.exe 102 PID 1704 set thread context of 2152 1704 file.exe 110 PID 4460 set thread context of 696 4460 file.exe 118 PID 4108 set thread context of 4312 4108 file.exe 126 PID 3632 set thread context of 4164 3632 file.exe 134 PID 1136 set thread context of 4220 1136 file.exe 144 PID 3260 set thread context of 3824 3260 file.exe 153 PID 3704 set thread context of 4444 3704 file.exe 163 PID 2008 set thread context of 4204 2008 file.exe 171 PID 4040 set thread context of 4172 4040 file.exe 180 PID 1116 set thread context of 1860 1116 file.exe 188 PID 1424 set thread context of 1312 1424 file.exe 196 PID 2760 set thread context of 4036 2760 file.exe 205 PID 2008 set thread context of 3524 2008 file.exe 214 PID 660 set thread context of 4908 660 file.exe 222 PID 1116 set thread context of 3356 1116 file.exe 231 PID 3212 set thread context of 4980 3212 file.exe 239 PID 4332 set thread context of 4312 4332 file.exe 249 PID 2064 set thread context of 4796 2064 file.exe 259 PID 1160 set thread context of 3404 1160 file.exe 270 PID 792 set thread context of 3704 792 file.exe 278 PID 2760 set thread context of 4972 2760 file.exe 286 PID 2364 set thread context of 4452 2364 file.exe 294 PID 848 set thread context of 2220 848 file.exe 302 PID 3260 set thread context of 5040 3260 file.exe 310 PID 4492 set thread context of 4980 4492 file.exe 318 PID 4444 set thread context of 212 4444 file.exe 327 PID 2240 set thread context of 1592 2240 file.exe 335 PID 3412 set thread context of 5084 3412 file.exe 344 PID 1440 set thread context of 4520 1440 file.exe 352 PID 4576 set thread context of 2516 4576 file.exe 360 PID 1044 set thread context of 4832 1044 file.exe 368 PID 3468 set thread context of 2616 3468 file.exe 376 PID 2572 set thread context of 1984 2572 file.exe 384 PID 2128 set thread context of 2108 2128 file.exe 392 PID 5040 set thread context of 1540 5040 file.exe 400 PID 1760 set thread context of 1052 1760 file.exe 411 PID 4688 set thread context of 4816 4688 file.exe 419 PID 2920 set thread context of 2964 2920 file.exe 427 PID 4900 set thread context of 5036 4900 file.exe 435 PID 4520 set thread context of 4092 4520 file.exe 444 PID 1456 set thread context of 2480 1456 file.exe 452 PID 1172 set thread context of 4452 1172 file.exe 460 PID 3468 set thread context of 3076 3468 file.exe 468 PID 4412 set thread context of 4800 4412 file.exe 476 PID 892 set thread context of 4472 892 file.exe 485 PID 1412 set thread context of 3636 1412 file.exe 494 PID 4316 set thread context of 2232 4316 file.exe 503 PID 4308 set thread context of 4284 4308 file.exe 511 PID 2988 set thread context of 2220 2988 file.exe 520 PID 1424 set thread context of 4976 1424 file.exe 528 PID 2144 set thread context of 1232 2144 file.exe 537 PID 460 set thread context of 1760 460 file.exe 546 PID 2376 set thread context of 3024 2376 file.exe 556 PID 4504 set thread context of 2220 4504 file.exe 564 PID 3864 set thread context of 2548 3864 file.exe 573 PID 4172 set thread context of 2016 4172 file.exe 582 PID 3440 set thread context of 3388 3440 file.exe 591 PID 4704 set thread context of 776 4704 file.exe 599 PID 2968 set thread context of 1768 2968 file.exe 607 PID 5036 set thread context of 2520 5036 file.exe 615 PID 852 set thread context of 4960 852 file.exe 624 PID 3988 set thread context of 1988 3988 file.exe 633 -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 4040 6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe Token: SeDebugPrivilege 2052 file.exe Token: SeDebugPrivilege 1620 Host.exe Token: SeDebugPrivilege 4504 file.exe Token: SeDebugPrivilege 1544 Host.exe Token: SeDebugPrivilege 1704 file.exe Token: SeDebugPrivilege 2004 Host.exe Token: SeDebugPrivilege 4460 file.exe Token: SeDebugPrivilege 2788 Host.exe Token: SeDebugPrivilege 4108 file.exe Token: SeDebugPrivilege 4652 Host.exe Token: SeDebugPrivilege 3632 file.exe Token: SeDebugPrivilege 4708 Host.exe Token: SeDebugPrivilege 1136 file.exe Token: SeDebugPrivilege 412 Host.exe Token: SeDebugPrivilege 3260 file.exe Token: SeDebugPrivilege 2760 Host.exe Token: SeDebugPrivilege 3704 file.exe Token: SeDebugPrivilege 2756 Host.exe Token: SeDebugPrivilege 2008 file.exe Token: SeDebugPrivilege 2024 Host.exe Token: SeDebugPrivilege 4040 file.exe Token: SeDebugPrivilege 2196 Host.exe Token: SeDebugPrivilege 1116 file.exe Token: SeDebugPrivilege 5040 Host.exe Token: SeDebugPrivilege 1424 file.exe Token: SeDebugPrivilege 4960 Host.exe Token: SeDebugPrivilege 2760 file.exe Token: SeDebugPrivilege 3004 Host.exe Token: SeDebugPrivilege 2008 file.exe Token: SeDebugPrivilege 4500 Host.exe Token: SeDebugPrivilege 660 file.exe Token: SeDebugPrivilege 4628 Host.exe Token: SeDebugPrivilege 1116 file.exe Token: SeDebugPrivilege 4832 Host.exe Token: SeDebugPrivilege 3212 file.exe Token: SeDebugPrivilege 4108 Host.exe Token: SeDebugPrivilege 4332 file.exe Token: SeDebugPrivilege 472 Host.exe Token: SeDebugPrivilege 2064 file.exe Token: SeDebugPrivilege 3520 Host.exe Token: SeDebugPrivilege 1160 file.exe Token: SeDebugPrivilege 3228 Host.exe Token: SeDebugPrivilege 792 file.exe Token: SeDebugPrivilege 4832 Host.exe Token: SeDebugPrivilege 2760 file.exe Token: SeDebugPrivilege 4420 Host.exe Token: SeDebugPrivilege 2364 file.exe Token: SeDebugPrivilege 1048 Host.exe Token: SeDebugPrivilege 848 file.exe Token: SeDebugPrivilege 3672 Host.exe Token: SeDebugPrivilege 3260 file.exe Token: SeDebugPrivilege 1456 Host.exe Token: SeDebugPrivilege 4492 file.exe Token: SeDebugPrivilege 3212 Host.exe Token: SeDebugPrivilege 4444 file.exe Token: SeDebugPrivilege 4924 Host.exe Token: SeDebugPrivilege 2240 file.exe Token: SeDebugPrivilege 4064 Host.exe Token: SeDebugPrivilege 3412 file.exe Token: SeDebugPrivilege 1048 Host.exe Token: SeDebugPrivilege 1440 file.exe Token: SeDebugPrivilege 3672 Host.exe Token: SeDebugPrivilege 4576 file.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4040 wrote to memory of 1140 4040 6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe 85 PID 4040 wrote to memory of 1140 4040 6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe 85 PID 4040 wrote to memory of 1140 4040 6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe 85 PID 1140 wrote to memory of 2052 1140 cmd.exe 88 PID 1140 wrote to memory of 2052 1140 cmd.exe 88 PID 1140 wrote to memory of 2052 1140 cmd.exe 88 PID 2052 wrote to memory of 1360 2052 file.exe 90 PID 2052 wrote to memory of 1360 2052 file.exe 90 PID 2052 wrote to memory of 1360 2052 file.exe 90 PID 1360 wrote to memory of 2232 1360 cmd.exe 92 PID 1360 wrote to memory of 2232 1360 cmd.exe 92 PID 1360 wrote to memory of 2232 1360 cmd.exe 92 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 2052 wrote to memory of 4916 2052 file.exe 93 PID 4916 wrote to memory of 1620 4916 file.exe 94 PID 4916 wrote to memory of 1620 4916 file.exe 94 PID 4916 wrote to memory of 1620 4916 file.exe 94 PID 1620 wrote to memory of 4984 1620 Host.exe 95 PID 1620 wrote to memory of 4984 1620 Host.exe 95 PID 1620 wrote to memory of 4984 1620 Host.exe 95 PID 4984 wrote to memory of 4504 4984 cmd.exe 97 PID 4984 wrote to memory of 4504 4984 cmd.exe 97 PID 4984 wrote to memory of 4504 4984 cmd.exe 97 PID 4504 wrote to memory of 628 4504 file.exe 98 PID 4504 wrote to memory of 628 4504 file.exe 98 PID 4504 wrote to memory of 628 4504 file.exe 98 PID 628 wrote to memory of 2304 628 cmd.exe 101 PID 628 wrote to memory of 2304 628 cmd.exe 101 PID 628 wrote to memory of 2304 628 cmd.exe 101 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 4504 wrote to memory of 1572 4504 file.exe 102 PID 1572 wrote to memory of 1544 1572 file.exe 103 PID 1572 wrote to memory of 1544 1572 file.exe 103 PID 1572 wrote to memory of 1544 1572 file.exe 103 PID 1544 wrote to memory of 4684 1544 Host.exe 104 PID 1544 wrote to memory of 4684 1544 Host.exe 104 PID 1544 wrote to memory of 4684 1544 Host.exe 104 PID 4684 wrote to memory of 1704 4684 cmd.exe 106 PID 4684 wrote to memory of 1704 4684 cmd.exe 106 PID 4684 wrote to memory of 1704 4684 cmd.exe 106 PID 1704 wrote to memory of 392 1704 file.exe 107 PID 1704 wrote to memory of 392 1704 file.exe 107 PID 1704 wrote to memory of 392 1704 file.exe 107 PID 392 wrote to memory of 4948 392 cmd.exe 109 PID 392 wrote to memory of 4948 392 cmd.exe 109 PID 392 wrote to memory of 4948 392 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\6b5a574c81822c806e598fde5aad93fc_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4040 -
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"5⤵PID:2232
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4916 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵
- Suspicious use of WriteProcessMemory
PID:628 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"9⤵
- Adds Run key to start application
PID:2304
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1572 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵
- Suspicious use of WriteProcessMemory
PID:4684 -
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"13⤵PID:4948
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"12⤵
- Executes dropped EXE
PID:2152 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\SysWOW64\cmd.exe"cmd"14⤵PID:4180
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\Windows\SysWOW64\cmd.exe"cmd"16⤵PID:4688
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"17⤵PID:4700
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"16⤵
- Executes dropped EXE
PID:696 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\SysWOW64\cmd.exe"cmd"18⤵PID:3332
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Windows\SysWOW64\cmd.exe"cmd"20⤵PID:184
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"21⤵
- Adds Run key to start application
PID:4364
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"20⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\SysWOW64\cmd.exe"cmd"22⤵PID:2792
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3632 -
C:\Windows\SysWOW64\cmd.exe"cmd"24⤵PID:2016
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"25⤵PID:3912
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"24⤵
- Executes dropped EXE
PID:4164 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4708 -
C:\Windows\SysWOW64\cmd.exe"cmd"26⤵PID:4796
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1136 -
C:\Windows\SysWOW64\cmd.exe"cmd"28⤵PID:4104
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"29⤵PID:660
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"28⤵
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\Windows\SysWOW64\cmd.exe"cmd"30⤵PID:1860
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\SysWOW64\cmd.exe"cmd"32⤵PID:4304
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"33⤵
- Adds Run key to start application
PID:3060
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"32⤵
- Executes dropped EXE
PID:4968
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"32⤵
- Executes dropped EXE
PID:3824 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"cmd"34⤵PID:4832
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3704 -
C:\Windows\SysWOW64\cmd.exe"cmd"36⤵PID:3784
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"37⤵
- Adds Run key to start application
PID:4492
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"36⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\cmd.exe"cmd"38⤵PID:2040
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\SysWOW64\cmd.exe"cmd"40⤵PID:472
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"41⤵PID:2748
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"40⤵
- Executes dropped EXE
PID:4204 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2024 -
C:\Windows\SysWOW64\cmd.exe"cmd"42⤵PID:3536
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4040 -
C:\Windows\SysWOW64\cmd.exe"cmd"44⤵PID:4796
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"45⤵PID:848
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"44⤵
- Executes dropped EXE
PID:4172 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\cmd.exe"cmd"46⤵PID:5100
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"cmd"48⤵PID:4964
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"49⤵
- Adds Run key to start application
PID:3672
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"48⤵
- Executes dropped EXE
PID:1860 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\Windows\SysWOW64\cmd.exe"cmd"50⤵PID:2968
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\cmd.exe"cmd"52⤵PID:3336
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"53⤵PID:1372
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"52⤵
- Executes dropped EXE
PID:1312 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4960 -
C:\Windows\SysWOW64\cmd.exe"cmd"54⤵PID:1540
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"cmd"56⤵PID:4336
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"57⤵PID:460
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"56⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3004 -
C:\Windows\SysWOW64\cmd.exe"cmd"58⤵PID:1592
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\Windows\SysWOW64\cmd.exe"cmd"60⤵PID:3340
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"61⤵PID:4816
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"60⤵
- Executes dropped EXE
PID:3524 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4500 -
C:\Windows\SysWOW64\cmd.exe"cmd"62⤵PID:4340
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:660 -
C:\Windows\SysWOW64\cmd.exe"cmd"64⤵PID:4380
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"65⤵PID:1392
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"64⤵
- Executes dropped EXE
PID:4908 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"65⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\SysWOW64\cmd.exe"cmd"66⤵PID:4220
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"67⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\cmd.exe"cmd"68⤵PID:3644
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"69⤵PID:3860
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"68⤵
- Executes dropped EXE
PID:2968
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"68⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"69⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\cmd.exe"cmd"70⤵PID:5040
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV171⤵PID:1424
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"71⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\SysWOW64\cmd.exe"cmd"72⤵PID:1540
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"73⤵PID:4576
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"72⤵
- Executes dropped EXE
PID:4980 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"73⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4108 -
C:\Windows\SysWOW64\cmd.exe"cmd"74⤵PID:852
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"75⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4332 -
C:\Windows\SysWOW64\cmd.exe"cmd"76⤵PID:4972
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"77⤵
- Adds Run key to start application
PID:1484
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"76⤵
- Executes dropped EXE
PID:4924
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"76⤵
- Executes dropped EXE
PID:3168
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"76⤵
- Executes dropped EXE
PID:4312 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"77⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:472 -
C:\Windows\SysWOW64\cmd.exe"cmd"78⤵PID:4652
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"79⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2064 -
C:\Windows\SysWOW64\cmd.exe"cmd"80⤵PID:3848
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"81⤵PID:2764
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"80⤵
- Executes dropped EXE
PID:628
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"80⤵
- Executes dropped EXE
PID:4796 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"81⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520 -
C:\Windows\SysWOW64\cmd.exe"cmd"82⤵PID:3672
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1160 -
C:\Windows\SysWOW64\cmd.exe"cmd"84⤵PID:1440
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"85⤵PID:3668
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"84⤵PID:3060
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"84⤵PID:3860
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"84⤵PID:3404
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"85⤵
- Suspicious use of AdjustPrivilegeToken
PID:3228 -
C:\Windows\SysWOW64\cmd.exe"cmd"86⤵PID:4132
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:792 -
C:\Windows\SysWOW64\cmd.exe"cmd"88⤵PID:2544
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"89⤵PID:1768
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"88⤵PID:3704
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"89⤵
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\cmd.exe"cmd"90⤵PID:4960
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\cmd.exe"cmd"92⤵PID:1980
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"93⤵PID:1760
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"92⤵PID:4972
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"93⤵
- Suspicious use of AdjustPrivilegeToken
PID:4420 -
C:\Windows\SysWOW64\cmd.exe"cmd"94⤵PID:4192
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2364 -
C:\Windows\SysWOW64\cmd.exe"cmd"96⤵PID:2972
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"97⤵PID:2232
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"96⤵PID:4452
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"97⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"cmd"98⤵PID:3340
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"99⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:848 -
C:\Windows\SysWOW64\cmd.exe"cmd"100⤵PID:4484
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"101⤵PID:5048
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"100⤵PID:2220
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"101⤵
- Suspicious use of AdjustPrivilegeToken
PID:3672 -
C:\Windows\SysWOW64\cmd.exe"cmd"102⤵PID:3904
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3260 -
C:\Windows\SysWOW64\cmd.exe"cmd"104⤵PID:4628
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"105⤵PID:1012
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"104⤵PID:5040
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"105⤵
- Suspicious use of AdjustPrivilegeToken
PID:1456 -
C:\Windows\SysWOW64\cmd.exe"cmd"106⤵PID:3800
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"107⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\cmd.exe"cmd"108⤵PID:792
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"109⤵PID:1804
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"108⤵PID:4980
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"109⤵
- Suspicious use of AdjustPrivilegeToken
PID:3212 -
C:\Windows\SysWOW64\cmd.exe"cmd"110⤵PID:2480
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4444 -
C:\Windows\SysWOW64\cmd.exe"cmd"112⤵PID:1528
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"113⤵PID:4912
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"112⤵PID:1764
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"112⤵PID:212
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"113⤵
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\SysWOW64\cmd.exe"cmd"114⤵PID:2864
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2240 -
C:\Windows\SysWOW64\cmd.exe"cmd"116⤵PID:4420
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"117⤵PID:4452
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"116⤵PID:1592
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"117⤵
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Windows\SysWOW64\cmd.exe"cmd"118⤵PID:2572
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Windows\SysWOW64\cmd.exe"cmd"120⤵PID:5016
-
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "Upd" /d "cmd /c type "C:\Users\Admin\AppData\Local\Temp\Upd.txt" | cmd"121⤵PID:4656
-
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"120⤵PID:3024
-
-
C:\Users\Admin\Desktop\file.exe"C:\Users\Admin\Desktop\file.exe"120⤵PID:5084
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"121⤵
- Suspicious use of AdjustPrivilegeToken
PID:1048 -
C:\Windows\SysWOW64\cmd.exe"cmd"122⤵PID:3644
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-