Analysis
-
max time kernel
122s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 23:05
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe
Resource
win7-20240508-en
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe
Resource
win10v2004-20240508-en
4 signatures
150 seconds
General
-
Target
23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe
-
Size
7KB
-
MD5
23c617015ebac74b84d9f155359fd5d4
-
SHA1
c3d40c89b08ade5b900eb0f2c6a7a40b6f848331
-
SHA256
44b7bbb787127f376e6d7feb273ea4d4374747163530fa306446bcaf28e7f2f7
-
SHA512
4ba0394079d950254fac195170eb08b027deaa5aa45f2b1a64338804eafd819207d93e613711653c1c5ac56656b522285ab64029c796f4716449a17c627bf978
-
SSDEEP
48:Cb1NbKXlDcHuCdUkQ9oYvuC8GPdGjLrtvrvcE9foTk04USODXF/4ZFzMUoyl1rca:Czok2rvuB9Nol47OXF/yFzMUoynRKe5
Score
7/10
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 16940 Process not Found -
Executes dropped EXE 64 IoCs
pid Process 2396 wmiprvze.exe 2412 wmiprvze.exe 3032 wmiprvze.exe 1920 wmiprvze.exe 2668 wmiprvze.exe 2736 wmiprvze.exe 2756 wmiprvze.exe 2684 wmiprvze.exe 2660 wmiprvze.exe 3048 wmiprvze.exe 2688 wmiprvze.exe 2944 wmiprvze.exe 3004 wmiprvze.exe 2640 wmiprvze.exe 2524 wmiprvze.exe 2540 wmiprvze.exe 2592 wmiprvze.exe 2952 wmiprvze.exe 2144 wmiprvze.exe 2476 wmiprvze.exe 1700 wmiprvze.exe 340 wmiprvze.exe 2500 wmiprvze.exe 1680 wmiprvze.exe 2596 wmiprvze.exe 1344 wmiprvze.exe 2220 wmiprvze.exe 2488 wmiprvze.exe 1888 wmiprvze.exe 1196 wmiprvze.exe 1816 wmiprvze.exe 2228 wmiprvze.exe 2212 wmiprvze.exe 1908 wmiprvze.exe 1996 wmiprvze.exe 2000 wmiprvze.exe 2012 wmiprvze.exe 1864 wmiprvze.exe 2004 wmiprvze.exe 1876 wmiprvze.exe 2332 wmiprvze.exe 2416 wmiprvze.exe 616 wmiprvze.exe 1752 wmiprvze.exe 860 wmiprvze.exe 1756 wmiprvze.exe 696 wmiprvze.exe 2200 wmiprvze.exe 1200 wmiprvze.exe 1624 wmiprvze.exe 1556 wmiprvze.exe 1636 wmiprvze.exe 2284 wmiprvze.exe 1652 wmiprvze.exe 1540 wmiprvze.exe 1628 wmiprvze.exe 1252 wmiprvze.exe 2288 wmiprvze.exe 1188 wmiprvze.exe 1748 wmiprvze.exe 2080 wmiprvze.exe 2076 wmiprvze.exe 2068 wmiprvze.exe 2256 wmiprvze.exe -
Loads dropped DLL 64 IoCs
pid Process 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe 2396 wmiprvze.exe 2396 wmiprvze.exe 2412 wmiprvze.exe 2412 wmiprvze.exe 3032 wmiprvze.exe 3032 wmiprvze.exe 1920 wmiprvze.exe 1920 wmiprvze.exe 2668 wmiprvze.exe 2668 wmiprvze.exe 2736 wmiprvze.exe 2736 wmiprvze.exe 2756 wmiprvze.exe 2756 wmiprvze.exe 2684 wmiprvze.exe 2684 wmiprvze.exe 2660 wmiprvze.exe 2660 wmiprvze.exe 3048 wmiprvze.exe 3048 wmiprvze.exe 2688 wmiprvze.exe 2688 wmiprvze.exe 2944 wmiprvze.exe 2944 wmiprvze.exe 3004 wmiprvze.exe 3004 wmiprvze.exe 2640 wmiprvze.exe 2640 wmiprvze.exe 2524 wmiprvze.exe 2524 wmiprvze.exe 2540 wmiprvze.exe 2540 wmiprvze.exe 2592 wmiprvze.exe 2592 wmiprvze.exe 2952 wmiprvze.exe 2952 wmiprvze.exe 2144 wmiprvze.exe 2144 wmiprvze.exe 2476 wmiprvze.exe 2476 wmiprvze.exe 1700 wmiprvze.exe 1700 wmiprvze.exe 340 wmiprvze.exe 340 wmiprvze.exe 2500 wmiprvze.exe 2500 wmiprvze.exe 1680 wmiprvze.exe 1680 wmiprvze.exe 2596 wmiprvze.exe 2596 wmiprvze.exe 1344 wmiprvze.exe 1344 wmiprvze.exe 2220 wmiprvze.exe 2220 wmiprvze.exe 2488 wmiprvze.exe 2488 wmiprvze.exe 1888 wmiprvze.exe 1888 wmiprvze.exe 1196 wmiprvze.exe 1196 wmiprvze.exe 1816 wmiprvze.exe 1816 wmiprvze.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe wmiprvze.exe File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found File created C:\Windows\SysWOW64\wmiprvze.exe Process not Found -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2396 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2412 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3032 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2668 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1920 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2684 wmiprvze.exe Token: SeIncBasePriorityPrivilege 3048 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2944 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2640 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2660 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2688 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2540 wmiprvze.exe Token: SeIncBasePriorityPrivilege 3004 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2952 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2524 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2476 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2592 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2144 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1700 wmiprvze.exe Token: SeIncBasePriorityPrivilege 340 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2500 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1680 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2596 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1888 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2220 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1816 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1344 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1996 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1196 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2488 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2212 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2012 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2004 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2332 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1908 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2000 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2228 wmiprvze.exe Token: SeIncBasePriorityPrivilege 616 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1864 wmiprvze.exe Token: SeIncBasePriorityPrivilege 860 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1200 wmiprvze.exe Token: SeIncBasePriorityPrivilege 696 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1556 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2284 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1252 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1540 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1188 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2736 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1628 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1876 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2288 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2416 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1752 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2080 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2756 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1652 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1756 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1624 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2200 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1636 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2068 wmiprvze.exe Token: SeIncBasePriorityPrivilege 2256 wmiprvze.exe Token: SeIncBasePriorityPrivilege 1748 wmiprvze.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2396 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2396 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2396 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe 28 PID 2148 wrote to memory of 2396 2148 23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe 28 PID 2396 wrote to memory of 2412 2396 wmiprvze.exe 29 PID 2396 wrote to memory of 2412 2396 wmiprvze.exe 29 PID 2396 wrote to memory of 2412 2396 wmiprvze.exe 29 PID 2396 wrote to memory of 2412 2396 wmiprvze.exe 29 PID 2412 wrote to memory of 3032 2412 wmiprvze.exe 30 PID 2412 wrote to memory of 3032 2412 wmiprvze.exe 30 PID 2412 wrote to memory of 3032 2412 wmiprvze.exe 30 PID 2412 wrote to memory of 3032 2412 wmiprvze.exe 30 PID 3032 wrote to memory of 1920 3032 wmiprvze.exe 31 PID 3032 wrote to memory of 1920 3032 wmiprvze.exe 31 PID 3032 wrote to memory of 1920 3032 wmiprvze.exe 31 PID 3032 wrote to memory of 1920 3032 wmiprvze.exe 31 PID 1920 wrote to memory of 2668 1920 wmiprvze.exe 32 PID 1920 wrote to memory of 2668 1920 wmiprvze.exe 32 PID 1920 wrote to memory of 2668 1920 wmiprvze.exe 32 PID 1920 wrote to memory of 2668 1920 wmiprvze.exe 32 PID 2668 wrote to memory of 2736 2668 wmiprvze.exe 33 PID 2668 wrote to memory of 2736 2668 wmiprvze.exe 33 PID 2668 wrote to memory of 2736 2668 wmiprvze.exe 33 PID 2668 wrote to memory of 2736 2668 wmiprvze.exe 33 PID 2736 wrote to memory of 2756 2736 wmiprvze.exe 34 PID 2736 wrote to memory of 2756 2736 wmiprvze.exe 34 PID 2736 wrote to memory of 2756 2736 wmiprvze.exe 34 PID 2736 wrote to memory of 2756 2736 wmiprvze.exe 34 PID 2756 wrote to memory of 2684 2756 wmiprvze.exe 35 PID 2756 wrote to memory of 2684 2756 wmiprvze.exe 35 PID 2756 wrote to memory of 2684 2756 wmiprvze.exe 35 PID 2756 wrote to memory of 2684 2756 wmiprvze.exe 35 PID 2684 wrote to memory of 2660 2684 wmiprvze.exe 36 PID 2684 wrote to memory of 2660 2684 wmiprvze.exe 36 PID 2684 wrote to memory of 2660 2684 wmiprvze.exe 36 PID 2684 wrote to memory of 2660 2684 wmiprvze.exe 36 PID 2660 wrote to memory of 3048 2660 wmiprvze.exe 37 PID 2660 wrote to memory of 3048 2660 wmiprvze.exe 37 PID 2660 wrote to memory of 3048 2660 wmiprvze.exe 37 PID 2660 wrote to memory of 3048 2660 wmiprvze.exe 37 PID 3048 wrote to memory of 2688 3048 wmiprvze.exe 38 PID 3048 wrote to memory of 2688 3048 wmiprvze.exe 38 PID 3048 wrote to memory of 2688 3048 wmiprvze.exe 38 PID 3048 wrote to memory of 2688 3048 wmiprvze.exe 38 PID 2688 wrote to memory of 2944 2688 wmiprvze.exe 39 PID 2688 wrote to memory of 2944 2688 wmiprvze.exe 39 PID 2688 wrote to memory of 2944 2688 wmiprvze.exe 39 PID 2688 wrote to memory of 2944 2688 wmiprvze.exe 39 PID 2944 wrote to memory of 3004 2944 wmiprvze.exe 40 PID 2944 wrote to memory of 3004 2944 wmiprvze.exe 40 PID 2944 wrote to memory of 3004 2944 wmiprvze.exe 40 PID 2944 wrote to memory of 3004 2944 wmiprvze.exe 40 PID 3004 wrote to memory of 2640 3004 wmiprvze.exe 41 PID 3004 wrote to memory of 2640 3004 wmiprvze.exe 41 PID 3004 wrote to memory of 2640 3004 wmiprvze.exe 41 PID 3004 wrote to memory of 2640 3004 wmiprvze.exe 41 PID 2640 wrote to memory of 2524 2640 wmiprvze.exe 42 PID 2640 wrote to memory of 2524 2640 wmiprvze.exe 42 PID 2640 wrote to memory of 2524 2640 wmiprvze.exe 42 PID 2640 wrote to memory of 2524 2640 wmiprvze.exe 42 PID 2524 wrote to memory of 2540 2524 wmiprvze.exe 43 PID 2524 wrote to memory of 2540 2524 wmiprvze.exe 43 PID 2524 wrote to memory of 2540 2524 wmiprvze.exe 43 PID 2524 wrote to memory of 2540 2524 wmiprvze.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\23c617015ebac74b84d9f155359fd5d4_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2592 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2952 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2144 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:340 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1344 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2488 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1196 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1816 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2228 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe34⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1908 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2012 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1864 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1876 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2332 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2416 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:616 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe45⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1756 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe48⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:696 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2200 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1200 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1624 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1556 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2284 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1652 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1540 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1252 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe59⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1188 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1748 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe63⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2068 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe65⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe66⤵PID:2508
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe67⤵PID:2716
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe68⤵PID:2704
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe69⤵PID:1968
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe70⤵PID:2352
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe71⤵PID:2760
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe72⤵PID:2896
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe73⤵PID:2900
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe74⤵PID:2104
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe75⤵PID:2056
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe76⤵PID:1448
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe77⤵PID:2360
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe78⤵PID:532
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe79⤵PID:704
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe80⤵PID:780
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe81⤵PID:580
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe82⤵PID:988
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe83⤵PID:1028
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe84⤵PID:1488
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe85⤵PID:592
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe86⤵PID:576
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe87⤵PID:1644
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe88⤵PID:3024
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe89⤵PID:1112
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe90⤵PID:1912
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe91⤵PID:2384
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe92⤵PID:568
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe93⤵PID:1800
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe94⤵PID:556
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe95⤵PID:1356
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe96⤵PID:1084
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe97⤵PID:2496
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe98⤵PID:1592
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe99⤵PID:948
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe100⤵PID:404
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe101⤵PID:1744
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe102⤵PID:1136
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe103⤵PID:2376
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe104⤵PID:1692
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe105⤵PID:2336
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe106⤵PID:2364
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe107⤵PID:1176
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe108⤵PID:1368
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe109⤵PID:1772
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe110⤵PID:1672
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe111⤵PID:1832
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe112⤵PID:1616
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe113⤵PID:880
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe114⤵PID:1312
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe115⤵PID:1620
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe116⤵PID:608
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe117⤵PID:1924
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe118⤵PID:1320
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe119⤵PID:1868
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe120⤵PID:1156
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe121⤵PID:1648
-
C:\Windows\SysWOW64\wmiprvze.exeC:\Windows\system32\wmiprvze.exe122⤵PID:2484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-