Analysis
-
max time kernel
33s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
25/06/2024, 15:38
Behavioral task
behavioral1
Sample
0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe
-
Size
57KB
-
MD5
0e9bfa6f8199ab35e47272d38f53ca36
-
SHA1
58df789da4b917d34b52efe4bda0a4c34082afd0
-
SHA256
e9c9e17fa521beaea422052cbb63beb68e80c5d66878d3f3feea5978d34d536e
-
SHA512
8779b77705f96cae9eaf6bf60feb2d8b22c9769ff70ce438a351d2917c8baed0b01777bb8453b9a23ca3b4ffab6ce98eb04c77eee9c3837e3c04e57ab692c2be
-
SSDEEP
1536:FBKK9S/y1Eqv9FvDW/h9l7i7lOThWWl71xTCCYrN4Yj55t3arl:FMK9S/y1Ee7bGXl79lWWl71xT/KN5dXa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515} server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{2bf41072-b2b1-21c1-b5c1-0305f4155515}\StubPath = "C:\\Windows\\system32\\server.exe" server.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe Key value queried \REGISTRY\USER\S-1-5-21-200405930-3877336739-3533750831-1000\Control Panel\International\Geo\Nation server.exe -
Executes dropped EXE 64 IoCs
pid Process 976 server.exe 5068 server.exe 2984 server.exe 3260 server.exe 3760 server.exe 396 server.exe 1184 server.exe 1900 server.exe 4492 server.exe 4572 server.exe 2016 server.exe 3820 server.exe 748 server.exe 1248 server.exe 400 server.exe 4056 server.exe 4368 server.exe 3272 server.exe 3672 server.exe 1620 server.exe 1096 server.exe 1260 server.exe 4384 server.exe 2812 server.exe 4344 server.exe 2880 server.exe 3792 server.exe 3320 server.exe 5096 server.exe 4568 server.exe 2056 server.exe 2164 server.exe 1624 server.exe 4708 server.exe 4456 server.exe 2316 server.exe 700 server.exe 5076 server.exe 2432 server.exe 3772 server.exe 4920 server.exe 4180 server.exe 3132 server.exe 3920 server.exe 3652 server.exe 3704 server.exe 5064 server.exe 3256 server.exe 3604 server.exe 928 server.exe 2936 server.exe 4500 server.exe 776 server.exe 3972 server.exe 1876 server.exe 2468 server.exe 1624 server.exe 1380 server.exe 4408 server.exe 4832 server.exe 448 server.exe 3772 server.exe 1460 server.exe 4580 server.exe -
resource yara_rule behavioral2/memory/1424-0-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/files/0x0007000000023381-5.dat upx behavioral2/memory/976-10-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1424-12-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-14-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/976-16-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5068-20-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2984-23-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3260-24-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3260-27-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3760-28-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3760-31-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-32-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/396-35-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1184-38-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1900-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1900-42-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-43-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-47-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4492-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4572-50-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-51-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2016-54-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3820-57-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-58-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/748-62-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1248-65-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/400-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/400-69-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4056-72-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4368-75-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3272-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3672-81-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-82-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1620-85-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1096-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1260-91-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4384-92-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4384-95-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-97-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2812-99-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4344-102-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2880-103-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-105-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2880-106-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3792-109-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-110-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3320-113-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5096-116-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4568-119-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2056-122-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2164-123-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2164-126-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1624-127-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1624-130-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4708-133-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-134-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4456-137-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2316-138-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2316-141-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/700-144-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/5076-147-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\StartKey = "C:\\Windows\\system32\\server.exe" server.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe File opened for modification C:\Windows\SysWOW64\server.exe server.exe File created C:\Windows\SysWOW64\server.exe server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 976 server.exe 976 server.exe 5068 server.exe 5068 server.exe 2984 server.exe 2984 server.exe 3260 server.exe 3260 server.exe 3760 server.exe 3760 server.exe 396 server.exe 396 server.exe 1184 server.exe 1184 server.exe 1900 server.exe 1900 server.exe 4492 server.exe 4492 server.exe 4572 server.exe 4572 server.exe 2016 server.exe 2016 server.exe 3820 server.exe 3820 server.exe 748 server.exe 748 server.exe 1248 server.exe 1248 server.exe 400 server.exe 400 server.exe 4056 server.exe 4056 server.exe 4368 server.exe 4368 server.exe 3272 server.exe 3272 server.exe 3672 server.exe 3672 server.exe 1620 server.exe 1620 server.exe 1096 server.exe 1096 server.exe 1260 server.exe 1260 server.exe 4384 server.exe 4384 server.exe 2812 server.exe 2812 server.exe 4344 server.exe 4344 server.exe 2880 server.exe 2880 server.exe 3792 server.exe 3792 server.exe 3320 server.exe 3320 server.exe 5096 server.exe 5096 server.exe 4568 server.exe 4568 server.exe 2056 server.exe 2056 server.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 976 server.exe 5068 server.exe 2984 server.exe 3260 server.exe 3760 server.exe 396 server.exe 1184 server.exe 1900 server.exe 4492 server.exe 4572 server.exe 2016 server.exe 3820 server.exe 748 server.exe 1248 server.exe 400 server.exe 4056 server.exe 4368 server.exe 3272 server.exe 3672 server.exe 1620 server.exe 1096 server.exe 1260 server.exe 4384 server.exe 2812 server.exe 4344 server.exe 2880 server.exe 3792 server.exe 3320 server.exe 5096 server.exe 4568 server.exe 2056 server.exe 2164 server.exe 1624 server.exe 4708 server.exe 4456 server.exe 2316 server.exe 700 server.exe 5076 server.exe 2432 server.exe 3772 server.exe 4920 server.exe 4180 server.exe 3132 server.exe 3920 server.exe 3652 server.exe 3704 server.exe 5064 server.exe 3256 server.exe 3604 server.exe 928 server.exe 2936 server.exe 4500 server.exe 776 server.exe 3972 server.exe 1876 server.exe 2468 server.exe 1624 server.exe 1380 server.exe 4408 server.exe 4832 server.exe 448 server.exe 3772 server.exe 1460 server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1424 wrote to memory of 3516 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 56 PID 1424 wrote to memory of 3516 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 56 PID 1424 wrote to memory of 3516 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 56 PID 1424 wrote to memory of 3516 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 56 PID 1424 wrote to memory of 976 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 83 PID 1424 wrote to memory of 976 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 83 PID 1424 wrote to memory of 976 1424 0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe 83 PID 976 wrote to memory of 3516 976 server.exe 56 PID 976 wrote to memory of 3516 976 server.exe 56 PID 976 wrote to memory of 3516 976 server.exe 56 PID 976 wrote to memory of 3516 976 server.exe 56 PID 976 wrote to memory of 5068 976 server.exe 84 PID 976 wrote to memory of 5068 976 server.exe 84 PID 976 wrote to memory of 5068 976 server.exe 84 PID 5068 wrote to memory of 3516 5068 server.exe 56 PID 5068 wrote to memory of 3516 5068 server.exe 56 PID 5068 wrote to memory of 3516 5068 server.exe 56 PID 5068 wrote to memory of 3516 5068 server.exe 56 PID 5068 wrote to memory of 2984 5068 server.exe 85 PID 5068 wrote to memory of 2984 5068 server.exe 85 PID 5068 wrote to memory of 2984 5068 server.exe 85 PID 2984 wrote to memory of 3516 2984 server.exe 56 PID 2984 wrote to memory of 3516 2984 server.exe 56 PID 2984 wrote to memory of 3516 2984 server.exe 56 PID 2984 wrote to memory of 3516 2984 server.exe 56 PID 2984 wrote to memory of 3260 2984 server.exe 86 PID 2984 wrote to memory of 3260 2984 server.exe 86 PID 2984 wrote to memory of 3260 2984 server.exe 86 PID 3260 wrote to memory of 3516 3260 server.exe 56 PID 3260 wrote to memory of 3516 3260 server.exe 56 PID 3260 wrote to memory of 3516 3260 server.exe 56 PID 3260 wrote to memory of 3516 3260 server.exe 56 PID 3260 wrote to memory of 3760 3260 server.exe 87 PID 3260 wrote to memory of 3760 3260 server.exe 87 PID 3260 wrote to memory of 3760 3260 server.exe 87 PID 3760 wrote to memory of 3516 3760 server.exe 56 PID 3760 wrote to memory of 3516 3760 server.exe 56 PID 3760 wrote to memory of 3516 3760 server.exe 56 PID 3760 wrote to memory of 3516 3760 server.exe 56 PID 3760 wrote to memory of 396 3760 server.exe 88 PID 3760 wrote to memory of 396 3760 server.exe 88 PID 3760 wrote to memory of 396 3760 server.exe 88 PID 396 wrote to memory of 3516 396 server.exe 56 PID 396 wrote to memory of 3516 396 server.exe 56 PID 396 wrote to memory of 3516 396 server.exe 56 PID 396 wrote to memory of 3516 396 server.exe 56 PID 396 wrote to memory of 1184 396 server.exe 89 PID 396 wrote to memory of 1184 396 server.exe 89 PID 396 wrote to memory of 1184 396 server.exe 89 PID 1184 wrote to memory of 3516 1184 server.exe 56 PID 1184 wrote to memory of 3516 1184 server.exe 56 PID 1184 wrote to memory of 3516 1184 server.exe 56 PID 1184 wrote to memory of 3516 1184 server.exe 56 PID 1184 wrote to memory of 1900 1184 server.exe 90 PID 1184 wrote to memory of 1900 1184 server.exe 90 PID 1184 wrote to memory of 1900 1184 server.exe 90 PID 1900 wrote to memory of 3516 1900 server.exe 56 PID 1900 wrote to memory of 3516 1900 server.exe 56 PID 1900 wrote to memory of 3516 1900 server.exe 56 PID 1900 wrote to memory of 3516 1900 server.exe 56 PID 1900 wrote to memory of 4492 1900 server.exe 91 PID 1900 wrote to memory of 4492 1900 server.exe 91 PID 1900 wrote to memory of 4492 1900 server.exe 91 PID 4492 wrote to memory of 3516 4492 server.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1424 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Users\Admin\AppData\Local\Temp\0e9bfa6f8199ab35e47272d38f53ca36_JaffaCakes118.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3760 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"8⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4572 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2016 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3820 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:748 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"16⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1248 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"17⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:400 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4056 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"19⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4368 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"20⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3272 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"21⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3672 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"22⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1620 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1096 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"24⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1260 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"25⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4384 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"26⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2812 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"27⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4344 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2880 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3792 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"30⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:3320 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:5096 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"32⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:4568 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:2056 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2164 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"35⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:1624 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4708 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"37⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4456 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:2316 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"39⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:700 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"40⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5076 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"41⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2432 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"42⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3772 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"43⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:4920 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:4180 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3132 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"46⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3920 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"47⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3652 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"48⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:3704 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"49⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:5064 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"50⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3256 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3604 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"52⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:928 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"53⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:2936 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:4500 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:776 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"56⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:3972 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:1876 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"58⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:2468 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"59⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of FindShellTrayWindow
PID:1624 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:1380 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"61⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:4408 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:4832 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:448 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"64⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3772 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"65⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:1460 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
PID:4580 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"67⤵
- Adds Run key to start application
PID:5060 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"68⤵
- Adds Run key to start application
PID:1260 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"69⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2100 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"70⤵PID:4380
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"71⤵
- Adds Run key to start application
PID:1496 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"72⤵PID:1280
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"73⤵
- Drops file in System32 directory
PID:4936 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"74⤵PID:3884
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"75⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
PID:1904 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"76⤵
- Adds Run key to start application
PID:3304 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"77⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"78⤵
- Drops file in System32 directory
PID:2052 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"79⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:2320 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"80⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
PID:1648 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"81⤵
- Boot or Logon Autostart Execution: Active Setup
PID:4636 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"82⤵
- Boot or Logon Autostart Execution: Active Setup
PID:880 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"83⤵
- Adds Run key to start application
PID:4348 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"84⤵
- Checks computer location settings
PID:1492 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"85⤵
- Drops file in System32 directory
PID:468 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"86⤵
- Checks computer location settings
- Adds Run key to start application
PID:4620 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"87⤵PID:3564
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"88⤵
- Drops file in System32 directory
PID:3132 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"89⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
PID:1896 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"90⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Drops file in System32 directory
PID:4364 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"91⤵
- Checks computer location settings
PID:1252 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"92⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
- Adds Run key to start application
PID:4388 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"93⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1544 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"94⤵PID:1940
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"95⤵
- Boot or Logon Autostart Execution: Active Setup
- Checks computer location settings
PID:3616 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"96⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:2992 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"97⤵
- Checks computer location settings
PID:2984 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"98⤵PID:2260
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"99⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1652 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"100⤵
- Adds Run key to start application
PID:3492 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"101⤵
- Checks computer location settings
- Adds Run key to start application
PID:3268 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"102⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3136 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"103⤵
- Checks computer location settings
PID:1732 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"104⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3800 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"105⤵
- Checks computer location settings
- Adds Run key to start application
PID:4468 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"106⤵PID:2504
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"107⤵
- Drops file in System32 directory
PID:4180 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"108⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
PID:2900 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"109⤵PID:4720
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"110⤵
- Checks computer location settings
PID:4680 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"111⤵
- Checks computer location settings
PID:4588 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"112⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:2020 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"113⤵
- Checks computer location settings
PID:3476 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"114⤵PID:1280
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"115⤵PID:3604
-
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"116⤵
- Adds Run key to start application
PID:3884 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"117⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3460 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"118⤵
- Drops file in System32 directory
PID:2168 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"119⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:996 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"120⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4976 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"121⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
PID:2968 -
C:\Windows\SysWOW64\server.exe"C:\Windows\system32\server.exe" "C:\Windows\SysWOW64\server.exe"122⤵
- Drops file in System32 directory
PID:1388
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-