Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
117s -
max time network
127s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
27/06/2024, 05:07
Behavioral task
behavioral1
Sample
14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe
Resource
win10v2004-20240508-en
General
-
Target
14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe
-
Size
80KB
-
MD5
14c7a4bfd58a5f2c89c6c1464de87054
-
SHA1
65ae1bdd8454056e4a94e3849a23ec8e89fdde7c
-
SHA256
88baa9717f39229de8fcf8f91adc4f21a0ea6eec31e377ec6ad40e7a03dfa050
-
SHA512
9037a25e7fcc5075a079cfa0e55d5b06d14e50c4fcf29d74627ecd75735bf5b0ec09308d59c3d0e2b23972efe0672d5e056787ed8f86264657a6937b20e31b33
-
SSDEEP
1536:5mjw3P1VGqVx30iJITWPPwq7q5hA/1oOO2uKzA0ZptWcfEN:Mjw3NnDkkgQxq5m102NzAgtps
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe Key value queried \REGISTRY\USER\S-1-5-21-1181767204-2009306918-3718769404-1000\Control Panel\International\Geo\Nation winboot.exe -
Executes dropped EXE 64 IoCs
pid Process 2432 winboot.exe 4768 winboot.exe 4692 winboot.exe 2720 winboot.exe 2788 winboot.exe 912 winboot.exe 2924 winboot.exe 2384 winboot.exe 2460 winboot.exe 3124 winboot.exe 2216 winboot.exe 4428 winboot.exe 5048 winboot.exe 2988 winboot.exe 5052 winboot.exe 4064 winboot.exe 4800 winboot.exe 2888 winboot.exe 1584 winboot.exe 4052 winboot.exe 3152 winboot.exe 2788 winboot.exe 2848 winboot.exe 2432 winboot.exe 3920 winboot.exe 5104 winboot.exe 4892 winboot.exe 4428 winboot.exe 5012 winboot.exe 4764 winboot.exe 3088 winboot.exe 4300 winboot.exe 3484 winboot.exe 4628 winboot.exe 3224 winboot.exe 2248 winboot.exe 2796 winboot.exe 3552 winboot.exe 5004 winboot.exe 2196 winboot.exe 3400 winboot.exe 4884 winboot.exe 4940 winboot.exe 4556 winboot.exe 1052 winboot.exe 964 winboot.exe 3864 winboot.exe 4984 winboot.exe 2764 winboot.exe 216 winboot.exe 4868 winboot.exe 1980 winboot.exe 2096 winboot.exe 4432 winboot.exe 872 winboot.exe 5072 winboot.exe 772 winboot.exe 5064 winboot.exe 2888 winboot.exe 4984 winboot.exe 4336 winboot.exe 1332 winboot.exe 2876 winboot.exe 3956 winboot.exe -
resource yara_rule behavioral2/memory/2044-0-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2044-1-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/files/0x0005000000022975-7.dat upx behavioral2/memory/2432-38-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2044-39-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2432-43-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4768-44-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4768-48-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4692-49-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2720-54-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4692-53-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2788-60-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2720-59-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/912-65-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2788-64-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2924-69-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/912-68-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2924-73-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2384-74-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2460-79-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2384-78-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2460-82-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3124-83-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2216-88-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3124-87-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2216-92-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4428-96-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5048-100-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2988-101-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2988-105-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5052-106-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5052-110-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4064-111-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4064-116-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4800-115-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4800-119-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2888-123-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/1584-125-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2460-124-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4052-130-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/1584-129-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3152-136-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4052-135-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3152-140-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2788-141-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2788-145-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2848-146-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2848-148-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2432-151-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/2432-155-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3920-158-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4892-163-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5104-162-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4428-168-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4892-167-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5012-173-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4428-172-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4764-178-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/5012-177-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4764-182-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3088-183-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4300-188-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/3088-187-0x0000000000400000-0x0000000000430000-memory.dmp upx behavioral2/memory/4300-192-0x0000000000400000-0x0000000000430000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Boot = "winboot.exe" winboot.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File created C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe File opened for modification C:\Windows\SysWOW64\winboot.exe winboot.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ winboot.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2432 winboot.exe Token: SeIncBasePriorityPrivilege 4768 winboot.exe Token: SeIncBasePriorityPrivilege 4692 winboot.exe Token: SeIncBasePriorityPrivilege 2720 winboot.exe Token: SeIncBasePriorityPrivilege 2788 winboot.exe Token: SeIncBasePriorityPrivilege 912 winboot.exe Token: SeIncBasePriorityPrivilege 2924 winboot.exe Token: SeIncBasePriorityPrivilege 2384 winboot.exe Token: SeIncBasePriorityPrivilege 2460 winboot.exe Token: SeIncBasePriorityPrivilege 3124 winboot.exe Token: SeIncBasePriorityPrivilege 2216 winboot.exe Token: SeIncBasePriorityPrivilege 4428 winboot.exe Token: SeIncBasePriorityPrivilege 5048 winboot.exe Token: SeIncBasePriorityPrivilege 2988 winboot.exe Token: SeIncBasePriorityPrivilege 5052 winboot.exe Token: SeIncBasePriorityPrivilege 4064 winboot.exe Token: SeIncBasePriorityPrivilege 4800 winboot.exe Token: SeIncBasePriorityPrivilege 2888 winboot.exe Token: SeIncBasePriorityPrivilege 1584 winboot.exe Token: SeIncBasePriorityPrivilege 4052 winboot.exe Token: SeIncBasePriorityPrivilege 3152 winboot.exe Token: SeIncBasePriorityPrivilege 2788 winboot.exe Token: SeIncBasePriorityPrivilege 2848 winboot.exe Token: SeIncBasePriorityPrivilege 2432 winboot.exe Token: SeIncBasePriorityPrivilege 3920 winboot.exe Token: SeIncBasePriorityPrivilege 5104 winboot.exe Token: SeIncBasePriorityPrivilege 4892 winboot.exe Token: SeIncBasePriorityPrivilege 4428 winboot.exe Token: SeIncBasePriorityPrivilege 5012 winboot.exe Token: SeIncBasePriorityPrivilege 4764 winboot.exe Token: SeIncBasePriorityPrivilege 3088 winboot.exe Token: SeIncBasePriorityPrivilege 4300 winboot.exe Token: SeIncBasePriorityPrivilege 3484 winboot.exe Token: SeIncBasePriorityPrivilege 4628 winboot.exe Token: SeIncBasePriorityPrivilege 3224 winboot.exe Token: SeIncBasePriorityPrivilege 2248 winboot.exe Token: SeIncBasePriorityPrivilege 2796 winboot.exe Token: SeIncBasePriorityPrivilege 3552 winboot.exe Token: SeIncBasePriorityPrivilege 5004 winboot.exe Token: SeIncBasePriorityPrivilege 2196 winboot.exe Token: SeIncBasePriorityPrivilege 3400 winboot.exe Token: SeIncBasePriorityPrivilege 4884 winboot.exe Token: SeIncBasePriorityPrivilege 4940 winboot.exe Token: SeIncBasePriorityPrivilege 4556 winboot.exe Token: SeIncBasePriorityPrivilege 1052 winboot.exe Token: SeIncBasePriorityPrivilege 964 winboot.exe Token: SeIncBasePriorityPrivilege 3864 winboot.exe Token: SeIncBasePriorityPrivilege 4984 winboot.exe Token: SeIncBasePriorityPrivilege 2764 winboot.exe Token: SeIncBasePriorityPrivilege 216 winboot.exe Token: SeIncBasePriorityPrivilege 4868 winboot.exe Token: SeIncBasePriorityPrivilege 1980 winboot.exe Token: SeIncBasePriorityPrivilege 2096 winboot.exe Token: SeIncBasePriorityPrivilege 4432 winboot.exe Token: SeIncBasePriorityPrivilege 872 winboot.exe Token: SeIncBasePriorityPrivilege 5072 winboot.exe Token: SeIncBasePriorityPrivilege 772 winboot.exe Token: SeIncBasePriorityPrivilege 5064 winboot.exe Token: SeIncBasePriorityPrivilege 2888 winboot.exe Token: SeIncBasePriorityPrivilege 4984 winboot.exe Token: SeIncBasePriorityPrivilege 4336 winboot.exe Token: SeIncBasePriorityPrivilege 1332 winboot.exe Token: SeIncBasePriorityPrivilege 2876 winboot.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2044 wrote to memory of 2432 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe 89 PID 2044 wrote to memory of 2432 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe 89 PID 2044 wrote to memory of 2432 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe 89 PID 2044 wrote to memory of 1316 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe 90 PID 2044 wrote to memory of 1316 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe 90 PID 2044 wrote to memory of 1316 2044 14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe 90 PID 2432 wrote to memory of 4768 2432 winboot.exe 92 PID 2432 wrote to memory of 4768 2432 winboot.exe 92 PID 2432 wrote to memory of 4768 2432 winboot.exe 92 PID 2432 wrote to memory of 2124 2432 winboot.exe 93 PID 2432 wrote to memory of 2124 2432 winboot.exe 93 PID 2432 wrote to memory of 2124 2432 winboot.exe 93 PID 4768 wrote to memory of 4692 4768 winboot.exe 95 PID 4768 wrote to memory of 4692 4768 winboot.exe 95 PID 4768 wrote to memory of 4692 4768 winboot.exe 95 PID 4768 wrote to memory of 468 4768 winboot.exe 96 PID 4768 wrote to memory of 468 4768 winboot.exe 96 PID 4768 wrote to memory of 468 4768 winboot.exe 96 PID 4692 wrote to memory of 2720 4692 winboot.exe 98 PID 4692 wrote to memory of 2720 4692 winboot.exe 98 PID 4692 wrote to memory of 2720 4692 winboot.exe 98 PID 4692 wrote to memory of 3936 4692 winboot.exe 99 PID 4692 wrote to memory of 3936 4692 winboot.exe 99 PID 4692 wrote to memory of 3936 4692 winboot.exe 99 PID 2720 wrote to memory of 2788 2720 winboot.exe 101 PID 2720 wrote to memory of 2788 2720 winboot.exe 101 PID 2720 wrote to memory of 2788 2720 winboot.exe 101 PID 2720 wrote to memory of 3400 2720 winboot.exe 102 PID 2720 wrote to memory of 3400 2720 winboot.exe 102 PID 2720 wrote to memory of 3400 2720 winboot.exe 102 PID 2788 wrote to memory of 912 2788 winboot.exe 104 PID 2788 wrote to memory of 912 2788 winboot.exe 104 PID 2788 wrote to memory of 912 2788 winboot.exe 104 PID 2788 wrote to memory of 3800 2788 winboot.exe 105 PID 2788 wrote to memory of 3800 2788 winboot.exe 105 PID 2788 wrote to memory of 3800 2788 winboot.exe 105 PID 912 wrote to memory of 2924 912 winboot.exe 109 PID 912 wrote to memory of 2924 912 winboot.exe 109 PID 912 wrote to memory of 2924 912 winboot.exe 109 PID 912 wrote to memory of 3972 912 winboot.exe 110 PID 912 wrote to memory of 3972 912 winboot.exe 110 PID 912 wrote to memory of 3972 912 winboot.exe 110 PID 2924 wrote to memory of 2384 2924 winboot.exe 112 PID 2924 wrote to memory of 2384 2924 winboot.exe 112 PID 2924 wrote to memory of 2384 2924 winboot.exe 112 PID 2924 wrote to memory of 1492 2924 winboot.exe 114 PID 2924 wrote to memory of 1492 2924 winboot.exe 114 PID 2924 wrote to memory of 1492 2924 winboot.exe 114 PID 2384 wrote to memory of 2460 2384 winboot.exe 117 PID 2384 wrote to memory of 2460 2384 winboot.exe 117 PID 2384 wrote to memory of 2460 2384 winboot.exe 117 PID 2384 wrote to memory of 4064 2384 winboot.exe 118 PID 2384 wrote to memory of 4064 2384 winboot.exe 118 PID 2384 wrote to memory of 4064 2384 winboot.exe 118 PID 2460 wrote to memory of 3124 2460 winboot.exe 121 PID 2460 wrote to memory of 3124 2460 winboot.exe 121 PID 2460 wrote to memory of 3124 2460 winboot.exe 121 PID 2460 wrote to memory of 4804 2460 winboot.exe 122 PID 2460 wrote to memory of 4804 2460 winboot.exe 122 PID 2460 wrote to memory of 4804 2460 winboot.exe 122 PID 3124 wrote to memory of 2216 3124 winboot.exe 124 PID 3124 wrote to memory of 2216 3124 winboot.exe 124 PID 3124 wrote to memory of 2216 3124 winboot.exe 124 PID 3124 wrote to memory of 2956 3124 winboot.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\14c7a4bfd58a5f2c89c6c1464de87054_JaffaCakes118.exe"1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"3⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4768 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:912 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2216 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4428 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5052 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4064 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"19⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1584 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4052 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3152 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"23⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2788 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"24⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2432 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"26⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3920 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"27⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4892 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4428 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5012 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"31⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4764 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"32⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3088 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4300 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3484 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3224 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"37⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2248 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"38⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2796 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3552 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5004 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2196 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4884 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4940 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4556 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"46⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1052 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"47⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:964 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3864 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"49⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:216 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"52⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4868 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"53⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2096 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"55⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4432 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:872 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5064 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2888 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"61⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4336 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1332 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:3956 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"66⤵
- Drops file in System32 directory
PID:1040 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"67⤵
- Checks computer location settings
PID:4432 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"68⤵
- Checks computer location settings
PID:1492 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"69⤵
- Checks computer location settings
PID:464 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"70⤵
- Adds Run key to start application
PID:656 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"71⤵
- Drops file in System32 directory
PID:4968 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"72⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4896 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"73⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3248 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"74⤵PID:3644
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"75⤵
- Modifies registry class
PID:4956 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"76⤵PID:4980
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"77⤵
- Checks computer location settings
PID:5052 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"78⤵
- Modifies registry class
PID:1904 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"79⤵PID:3484
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"80⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3120 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"81⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3552 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"82⤵
- Checks computer location settings
PID:1244 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"83⤵
- Modifies registry class
PID:3144 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"84⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4144 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"85⤵PID:4624
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"86⤵
- Modifies registry class
PID:3972 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"87⤵PID:804
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"88⤵PID:2172
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"89⤵PID:2160
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"90⤵PID:3756
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"91⤵
- Checks computer location settings
PID:2620 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"92⤵PID:2872
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"93⤵PID:216
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"94⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4764 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"95⤵PID:2720
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"96⤵
- Drops file in System32 directory
PID:3020 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"97⤵PID:4980
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"98⤵
- Drops file in System32 directory
PID:4632 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"99⤵
- Drops file in System32 directory
PID:2216 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"100⤵
- Modifies registry class
PID:2032 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"101⤵
- Checks computer location settings
PID:2604 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"102⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3148 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"103⤵
- Modifies registry class
PID:4560 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"104⤵
- Modifies registry class
PID:3492 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"105⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1120 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"106⤵
- Checks computer location settings
PID:388 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"107⤵
- Checks computer location settings
- Modifies registry class
PID:3152 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"108⤵
- Drops file in System32 directory
- Modifies registry class
PID:5076 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"109⤵
- Modifies registry class
PID:4136 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"110⤵
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"111⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3320 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"112⤵
- Checks computer location settings
- Adds Run key to start application
PID:4348 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"113⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1640 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"114⤵
- Adds Run key to start application
- Modifies registry class
PID:4800 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"115⤵
- Checks computer location settings
PID:2848 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"116⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"117⤵PID:4536
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"118⤵PID:2280
-
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"119⤵
- Adds Run key to start application
PID:1040 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"120⤵
- Checks computer location settings
PID:4208 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"121⤵
- Modifies registry class
PID:2540 -
C:\Windows\SysWOW64\winboot.exe"C:\Windows\system32\winboot.exe"122⤵PID:916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-