Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-06-2024 11:44
Static task
static1
Behavioral task
behavioral1
Sample
0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe
-
Size
1.1MB
-
MD5
0df0bdd5f09012598f0d6fb4c8719820
-
SHA1
c1b4d4a7e76e6112ca7e5b9b7df8cdde85f7c0ca
-
SHA256
b2f311453fb3153464a82d1cb371fef1fd155b23cf9e6c41652b7c113b57763c
-
SHA512
78ac94e9bfabd32bbb96df4c963604cce0722eac41d492a70307a17b0ca20f3da4cc9040b4c48455973aa9838b65075d9bd9a391e78c66faeee41a7f003b6b41
-
SSDEEP
768:9SyCk0yiLw6K7njb5Vf0XghCF7RlH5sf1zBmQzTGfmgyq/4U:ikViCnoXghCF7PHWf1zwQVgv/F
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 1764 userinit.exe 3040 system.exe 2560 system.exe 2736 system.exe 2220 system.exe 2576 system.exe 500 system.exe 2868 system.exe 1600 system.exe 1968 system.exe 2376 system.exe 2516 system.exe 1544 system.exe 2092 system.exe 2440 system.exe 2256 system.exe 532 system.exe 3032 system.exe 1660 system.exe 3064 system.exe 1988 system.exe 1848 system.exe 1288 system.exe 2240 system.exe 1004 system.exe 1804 system.exe 1624 system.exe 2796 system.exe 2140 system.exe 2676 system.exe 2632 system.exe 2484 system.exe 2736 system.exe 2708 system.exe 1680 system.exe 2212 system.exe 2768 system.exe 2264 system.exe 1656 system.exe 1980 system.exe 1700 system.exe 2320 system.exe 644 system.exe 1776 system.exe 2756 system.exe 488 system.exe 1132 system.exe 2332 system.exe 1660 system.exe 1568 system.exe 1372 system.exe 1080 system.exe 2820 system.exe 3048 system.exe 912 system.exe 1720 system.exe 2536 system.exe 2112 system.exe 2664 system.exe 2588 system.exe 2632 system.exe 2568 system.exe 2520 system.exe 2888 system.exe -
Loads dropped DLL 64 IoCs
pid Process 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe 1764 userinit.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe File created C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 1764 userinit.exe 1764 userinit.exe 3040 system.exe 1764 userinit.exe 2560 system.exe 1764 userinit.exe 2736 system.exe 1764 userinit.exe 2220 system.exe 1764 userinit.exe 2576 system.exe 1764 userinit.exe 500 system.exe 1764 userinit.exe 2868 system.exe 1764 userinit.exe 1600 system.exe 1764 userinit.exe 1968 system.exe 1764 userinit.exe 2376 system.exe 1764 userinit.exe 2516 system.exe 1764 userinit.exe 1544 system.exe 1764 userinit.exe 2092 system.exe 1764 userinit.exe 2440 system.exe 1764 userinit.exe 2256 system.exe 1764 userinit.exe 532 system.exe 1764 userinit.exe 3032 system.exe 1764 userinit.exe 1660 system.exe 1764 userinit.exe 3064 system.exe 1764 userinit.exe 1988 system.exe 1764 userinit.exe 1848 system.exe 1764 userinit.exe 1288 system.exe 1764 userinit.exe 2240 system.exe 1764 userinit.exe 1004 system.exe 1764 userinit.exe 1804 system.exe 1764 userinit.exe 1624 system.exe 1764 userinit.exe 2796 system.exe 1764 userinit.exe 2140 system.exe 1764 userinit.exe 2676 system.exe 1764 userinit.exe 2632 system.exe 1764 userinit.exe 2484 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1764 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 1764 userinit.exe 1764 userinit.exe 3040 system.exe 3040 system.exe 2560 system.exe 2560 system.exe 2736 system.exe 2736 system.exe 2220 system.exe 2220 system.exe 2576 system.exe 2576 system.exe 500 system.exe 500 system.exe 2868 system.exe 2868 system.exe 1600 system.exe 1600 system.exe 1968 system.exe 1968 system.exe 2376 system.exe 2376 system.exe 2516 system.exe 2516 system.exe 1544 system.exe 1544 system.exe 2092 system.exe 2092 system.exe 2440 system.exe 2440 system.exe 2256 system.exe 2256 system.exe 532 system.exe 532 system.exe 3032 system.exe 3032 system.exe 1660 system.exe 1660 system.exe 3064 system.exe 3064 system.exe 1988 system.exe 1988 system.exe 1848 system.exe 1848 system.exe 1288 system.exe 1288 system.exe 2240 system.exe 2240 system.exe 1004 system.exe 1004 system.exe 1804 system.exe 1804 system.exe 1624 system.exe 1624 system.exe 2796 system.exe 2796 system.exe 2140 system.exe 2140 system.exe 2676 system.exe 2676 system.exe 2632 system.exe 2632 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2800 wrote to memory of 1764 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 28 PID 2800 wrote to memory of 1764 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 28 PID 2800 wrote to memory of 1764 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 28 PID 2800 wrote to memory of 1764 2800 0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe 28 PID 1764 wrote to memory of 3040 1764 userinit.exe 29 PID 1764 wrote to memory of 3040 1764 userinit.exe 29 PID 1764 wrote to memory of 3040 1764 userinit.exe 29 PID 1764 wrote to memory of 3040 1764 userinit.exe 29 PID 1764 wrote to memory of 2560 1764 userinit.exe 30 PID 1764 wrote to memory of 2560 1764 userinit.exe 30 PID 1764 wrote to memory of 2560 1764 userinit.exe 30 PID 1764 wrote to memory of 2560 1764 userinit.exe 30 PID 1764 wrote to memory of 2736 1764 userinit.exe 31 PID 1764 wrote to memory of 2736 1764 userinit.exe 31 PID 1764 wrote to memory of 2736 1764 userinit.exe 31 PID 1764 wrote to memory of 2736 1764 userinit.exe 31 PID 1764 wrote to memory of 2220 1764 userinit.exe 32 PID 1764 wrote to memory of 2220 1764 userinit.exe 32 PID 1764 wrote to memory of 2220 1764 userinit.exe 32 PID 1764 wrote to memory of 2220 1764 userinit.exe 32 PID 1764 wrote to memory of 2576 1764 userinit.exe 33 PID 1764 wrote to memory of 2576 1764 userinit.exe 33 PID 1764 wrote to memory of 2576 1764 userinit.exe 33 PID 1764 wrote to memory of 2576 1764 userinit.exe 33 PID 1764 wrote to memory of 500 1764 userinit.exe 34 PID 1764 wrote to memory of 500 1764 userinit.exe 34 PID 1764 wrote to memory of 500 1764 userinit.exe 34 PID 1764 wrote to memory of 500 1764 userinit.exe 34 PID 1764 wrote to memory of 2868 1764 userinit.exe 35 PID 1764 wrote to memory of 2868 1764 userinit.exe 35 PID 1764 wrote to memory of 2868 1764 userinit.exe 35 PID 1764 wrote to memory of 2868 1764 userinit.exe 35 PID 1764 wrote to memory of 1600 1764 userinit.exe 36 PID 1764 wrote to memory of 1600 1764 userinit.exe 36 PID 1764 wrote to memory of 1600 1764 userinit.exe 36 PID 1764 wrote to memory of 1600 1764 userinit.exe 36 PID 1764 wrote to memory of 1968 1764 userinit.exe 37 PID 1764 wrote to memory of 1968 1764 userinit.exe 37 PID 1764 wrote to memory of 1968 1764 userinit.exe 37 PID 1764 wrote to memory of 1968 1764 userinit.exe 37 PID 1764 wrote to memory of 2376 1764 userinit.exe 38 PID 1764 wrote to memory of 2376 1764 userinit.exe 38 PID 1764 wrote to memory of 2376 1764 userinit.exe 38 PID 1764 wrote to memory of 2376 1764 userinit.exe 38 PID 1764 wrote to memory of 2516 1764 userinit.exe 39 PID 1764 wrote to memory of 2516 1764 userinit.exe 39 PID 1764 wrote to memory of 2516 1764 userinit.exe 39 PID 1764 wrote to memory of 2516 1764 userinit.exe 39 PID 1764 wrote to memory of 1544 1764 userinit.exe 40 PID 1764 wrote to memory of 1544 1764 userinit.exe 40 PID 1764 wrote to memory of 1544 1764 userinit.exe 40 PID 1764 wrote to memory of 1544 1764 userinit.exe 40 PID 1764 wrote to memory of 2092 1764 userinit.exe 41 PID 1764 wrote to memory of 2092 1764 userinit.exe 41 PID 1764 wrote to memory of 2092 1764 userinit.exe 41 PID 1764 wrote to memory of 2092 1764 userinit.exe 41 PID 1764 wrote to memory of 2440 1764 userinit.exe 42 PID 1764 wrote to memory of 2440 1764 userinit.exe 42 PID 1764 wrote to memory of 2440 1764 userinit.exe 42 PID 1764 wrote to memory of 2440 1764 userinit.exe 42 PID 1764 wrote to memory of 2256 1764 userinit.exe 43 PID 1764 wrote to memory of 2256 1764 userinit.exe 43 PID 1764 wrote to memory of 2256 1764 userinit.exe 43 PID 1764 wrote to memory of 2256 1764 userinit.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0df0bdd5f09012598f0d6fb4c8719820_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3040
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:500
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2868
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1600
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2376
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2516
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2092
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2440
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2256
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:532
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1660
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1848
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2240
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1624
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2140
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2676
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2632
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2484
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2736
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2708
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2768
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1980
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2320
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1776
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2756
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2332
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1660
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1568
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1720
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2536
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2664
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2632
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2568
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2888
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1952
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2144
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1596
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1600
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1364
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1956
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1532
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:592
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2028
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1836
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1080
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2388
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2156
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2604
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2616
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2628
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1716
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2784
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:320
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1292
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2352
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1956
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2272
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:600
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1164
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2972
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1296
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2232
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1884
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2832
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2912
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2952
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2796
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2716
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2616
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1684
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1676
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2544
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2276
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1772
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2304
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:824
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2320
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2244
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2296
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1664
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.1MB
MD50df0bdd5f09012598f0d6fb4c8719820
SHA1c1b4d4a7e76e6112ca7e5b9b7df8cdde85f7c0ca
SHA256b2f311453fb3153464a82d1cb371fef1fd155b23cf9e6c41652b7c113b57763c
SHA51278ac94e9bfabd32bbb96df4c963604cce0722eac41d492a70307a17b0ca20f3da4cc9040b4c48455973aa9838b65075d9bd9a391e78c66faeee41a7f003b6b41