Analysis
-
max time kernel
121s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20240611-en -
resource tags
arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system -
submitted
04/07/2024, 01:02
Behavioral task
behavioral1
Sample
241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe
Resource
win10v2004-20240611-en
General
-
Target
241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe
-
Size
128KB
-
MD5
241aba51527cb35faa2e52e798305eab
-
SHA1
1aff8d07b3baba98bb72b4643d8c07289e53b9fe
-
SHA256
af682d71b04ff78da928b17cb7f4ab841c6bfb4a1aa50920b7e14deefee3702f
-
SHA512
2cdfd7c5ea23632d205aed0b819f25703ff1c8e9d5e4b14b4eb8b7004a7c70fe0e7865565377a99a8529d7ceacf5580af7adf73ffb8ad7858db3612b3fb27870
-
SSDEEP
3072:3jUVmf4sBefCTnU6+/LLN+IWtRqBzUC9YhaMyRhw:wVmAsBeffB+/tRqBzOAw
Malware Config
Signatures
-
Blocklisted process makes network request 6 IoCs
flow pid Process 32 3120 Process not Found 36 3120 Process not Found 38 3120 Process not Found 39 3120 Process not Found 41 3120 Process not Found 56 528 Process not Found -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe Key value queried \REGISTRY\USER\S-1-5-21-4204450073-1267028356-951339405-1000\Control Panel\International\Geo\Nation doskeyer.exe -
Executes dropped EXE 64 IoCs
pid Process 3016 doskeyer.exe 4376 doskeyer.exe 4940 doskeyer.exe 4792 doskeyer.exe 1460 doskeyer.exe 2360 doskeyer.exe 3276 doskeyer.exe 4300 doskeyer.exe 4432 doskeyer.exe 2132 doskeyer.exe 3524 doskeyer.exe 4568 doskeyer.exe 1452 doskeyer.exe 2072 doskeyer.exe 4468 doskeyer.exe 1616 doskeyer.exe 636 doskeyer.exe 4436 doskeyer.exe 4980 doskeyer.exe 3120 doskeyer.exe 3332 doskeyer.exe 4820 doskeyer.exe 3132 doskeyer.exe 3136 doskeyer.exe 4256 doskeyer.exe 4836 doskeyer.exe 1180 doskeyer.exe 1900 doskeyer.exe 2388 doskeyer.exe 3300 doskeyer.exe 1776 doskeyer.exe 5116 doskeyer.exe 3124 doskeyer.exe 3252 doskeyer.exe 1620 doskeyer.exe 1960 doskeyer.exe 640 doskeyer.exe 1636 doskeyer.exe 4020 doskeyer.exe 3472 doskeyer.exe 2256 doskeyer.exe 372 doskeyer.exe 3468 doskeyer.exe 3872 doskeyer.exe 4344 doskeyer.exe 1936 doskeyer.exe 1632 doskeyer.exe 5116 doskeyer.exe 3972 doskeyer.exe 3996 doskeyer.exe 4876 doskeyer.exe 4924 doskeyer.exe 4132 doskeyer.exe 3112 doskeyer.exe 832 doskeyer.exe 3264 doskeyer.exe 4900 doskeyer.exe 4544 doskeyer.exe 4308 doskeyer.exe 2688 doskeyer.exe 708 doskeyer.exe 2712 doskeyer.exe 2472 doskeyer.exe 4324 doskeyer.exe -
resource yara_rule behavioral2/memory/2776-0-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2776-1-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/files/0x0008000000023565-7.dat upx behavioral2/memory/3016-37-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2776-39-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4376-44-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3016-43-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4376-48-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4940-52-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1460-57-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4792-56-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1460-61-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2360-65-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4300-70-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3276-69-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4300-74-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4432-75-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4432-79-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2132-80-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2132-84-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4568-89-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3524-88-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4568-93-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1452-97-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2072-98-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2072-102-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4468-103-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4468-107-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1616-111-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/636-112-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/636-115-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4436-121-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4980-119-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4980-125-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3120-129-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3332-130-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3332-134-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4820-138-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3132-142-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3136-146-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4256-147-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4836-153-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4256-152-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/4836-157-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1180-158-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1180-162-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1900-163-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1900-168-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2388-167-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/2388-172-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3300-176-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1776-177-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/5116-181-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1776-183-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3124-188-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/5116-187-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3124-192-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/3252-195-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1960-199-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1620-197-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/640-203-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1960-202-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/640-206-0x0000000000400000-0x0000000000445000-memory.dmp upx behavioral2/memory/1636-207-0x0000000000400000-0x0000000000445000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DOS Keyer = "doskeyer.exe" doskeyer.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File created C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe File opened for modification C:\Windows\SysWOW64\doskeyer.exe doskeyer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ doskeyer.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3016 doskeyer.exe Token: SeIncBasePriorityPrivilege 4376 doskeyer.exe Token: SeIncBasePriorityPrivilege 4940 doskeyer.exe Token: SeIncBasePriorityPrivilege 4792 doskeyer.exe Token: SeIncBasePriorityPrivilege 1460 doskeyer.exe Token: SeIncBasePriorityPrivilege 2360 doskeyer.exe Token: SeIncBasePriorityPrivilege 3276 doskeyer.exe Token: SeIncBasePriorityPrivilege 4300 doskeyer.exe Token: SeIncBasePriorityPrivilege 4432 doskeyer.exe Token: SeIncBasePriorityPrivilege 2132 doskeyer.exe Token: SeIncBasePriorityPrivilege 3524 doskeyer.exe Token: SeIncBasePriorityPrivilege 4568 doskeyer.exe Token: SeIncBasePriorityPrivilege 1452 doskeyer.exe Token: SeIncBasePriorityPrivilege 2072 doskeyer.exe Token: SeIncBasePriorityPrivilege 4468 doskeyer.exe Token: SeIncBasePriorityPrivilege 1616 doskeyer.exe Token: SeIncBasePriorityPrivilege 636 doskeyer.exe Token: SeIncBasePriorityPrivilege 4436 doskeyer.exe Token: SeIncBasePriorityPrivilege 4980 doskeyer.exe Token: SeIncBasePriorityPrivilege 3120 doskeyer.exe Token: SeIncBasePriorityPrivilege 3332 doskeyer.exe Token: SeIncBasePriorityPrivilege 4820 doskeyer.exe Token: SeIncBasePriorityPrivilege 3132 doskeyer.exe Token: SeIncBasePriorityPrivilege 3136 doskeyer.exe Token: SeIncBasePriorityPrivilege 4256 doskeyer.exe Token: SeIncBasePriorityPrivilege 4836 doskeyer.exe Token: SeIncBasePriorityPrivilege 1180 doskeyer.exe Token: SeIncBasePriorityPrivilege 1900 doskeyer.exe Token: SeIncBasePriorityPrivilege 2388 doskeyer.exe Token: SeIncBasePriorityPrivilege 3300 doskeyer.exe Token: SeIncBasePriorityPrivilege 1776 doskeyer.exe Token: SeIncBasePriorityPrivilege 5116 doskeyer.exe Token: SeIncBasePriorityPrivilege 3124 doskeyer.exe Token: SeIncBasePriorityPrivilege 3252 doskeyer.exe Token: SeIncBasePriorityPrivilege 1620 doskeyer.exe Token: SeIncBasePriorityPrivilege 1960 doskeyer.exe Token: SeIncBasePriorityPrivilege 640 doskeyer.exe Token: SeIncBasePriorityPrivilege 1636 doskeyer.exe Token: SeIncBasePriorityPrivilege 4020 doskeyer.exe Token: SeIncBasePriorityPrivilege 3472 doskeyer.exe Token: SeIncBasePriorityPrivilege 2256 doskeyer.exe Token: SeIncBasePriorityPrivilege 372 doskeyer.exe Token: SeIncBasePriorityPrivilege 3468 doskeyer.exe Token: SeIncBasePriorityPrivilege 3872 doskeyer.exe Token: SeIncBasePriorityPrivilege 4344 doskeyer.exe Token: SeIncBasePriorityPrivilege 1936 doskeyer.exe Token: SeIncBasePriorityPrivilege 1632 doskeyer.exe Token: SeIncBasePriorityPrivilege 5116 doskeyer.exe Token: SeIncBasePriorityPrivilege 3972 doskeyer.exe Token: SeIncBasePriorityPrivilege 3996 doskeyer.exe Token: SeIncBasePriorityPrivilege 4876 doskeyer.exe Token: SeIncBasePriorityPrivilege 4924 doskeyer.exe Token: SeIncBasePriorityPrivilege 4132 doskeyer.exe Token: SeIncBasePriorityPrivilege 3112 doskeyer.exe Token: SeIncBasePriorityPrivilege 832 doskeyer.exe Token: SeIncBasePriorityPrivilege 3264 doskeyer.exe Token: SeIncBasePriorityPrivilege 4900 doskeyer.exe Token: SeIncBasePriorityPrivilege 4544 doskeyer.exe Token: SeIncBasePriorityPrivilege 4308 doskeyer.exe Token: SeIncBasePriorityPrivilege 2688 doskeyer.exe Token: SeIncBasePriorityPrivilege 708 doskeyer.exe Token: SeIncBasePriorityPrivilege 2712 doskeyer.exe Token: SeIncBasePriorityPrivilege 2472 doskeyer.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2776 wrote to memory of 3016 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe 83 PID 2776 wrote to memory of 3016 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe 83 PID 2776 wrote to memory of 3016 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe 83 PID 2776 wrote to memory of 2932 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe 84 PID 2776 wrote to memory of 2932 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe 84 PID 2776 wrote to memory of 2932 2776 241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe 84 PID 3016 wrote to memory of 4376 3016 doskeyer.exe 87 PID 3016 wrote to memory of 4376 3016 doskeyer.exe 87 PID 3016 wrote to memory of 4376 3016 doskeyer.exe 87 PID 3016 wrote to memory of 5064 3016 doskeyer.exe 88 PID 3016 wrote to memory of 5064 3016 doskeyer.exe 88 PID 3016 wrote to memory of 5064 3016 doskeyer.exe 88 PID 4376 wrote to memory of 4940 4376 doskeyer.exe 91 PID 4376 wrote to memory of 4940 4376 doskeyer.exe 91 PID 4376 wrote to memory of 4940 4376 doskeyer.exe 91 PID 4376 wrote to memory of 672 4376 doskeyer.exe 92 PID 4376 wrote to memory of 672 4376 doskeyer.exe 92 PID 4376 wrote to memory of 672 4376 doskeyer.exe 92 PID 4940 wrote to memory of 4792 4940 doskeyer.exe 94 PID 4940 wrote to memory of 4792 4940 doskeyer.exe 94 PID 4940 wrote to memory of 4792 4940 doskeyer.exe 94 PID 4940 wrote to memory of 840 4940 doskeyer.exe 95 PID 4940 wrote to memory of 840 4940 doskeyer.exe 95 PID 4940 wrote to memory of 840 4940 doskeyer.exe 95 PID 4792 wrote to memory of 1460 4792 doskeyer.exe 97 PID 4792 wrote to memory of 1460 4792 doskeyer.exe 97 PID 4792 wrote to memory of 1460 4792 doskeyer.exe 97 PID 4792 wrote to memory of 3708 4792 doskeyer.exe 98 PID 4792 wrote to memory of 3708 4792 doskeyer.exe 98 PID 4792 wrote to memory of 3708 4792 doskeyer.exe 98 PID 1460 wrote to memory of 2360 1460 doskeyer.exe 100 PID 1460 wrote to memory of 2360 1460 doskeyer.exe 100 PID 1460 wrote to memory of 2360 1460 doskeyer.exe 100 PID 1460 wrote to memory of 3264 1460 doskeyer.exe 129 PID 1460 wrote to memory of 3264 1460 doskeyer.exe 129 PID 1460 wrote to memory of 3264 1460 doskeyer.exe 129 PID 2360 wrote to memory of 3276 2360 doskeyer.exe 103 PID 2360 wrote to memory of 3276 2360 doskeyer.exe 103 PID 2360 wrote to memory of 3276 2360 doskeyer.exe 103 PID 2360 wrote to memory of 4936 2360 doskeyer.exe 104 PID 2360 wrote to memory of 4936 2360 doskeyer.exe 104 PID 2360 wrote to memory of 4936 2360 doskeyer.exe 104 PID 3276 wrote to memory of 4300 3276 doskeyer.exe 106 PID 3276 wrote to memory of 4300 3276 doskeyer.exe 106 PID 3276 wrote to memory of 4300 3276 doskeyer.exe 106 PID 3276 wrote to memory of 4372 3276 doskeyer.exe 107 PID 3276 wrote to memory of 4372 3276 doskeyer.exe 107 PID 3276 wrote to memory of 4372 3276 doskeyer.exe 107 PID 4300 wrote to memory of 4432 4300 doskeyer.exe 109 PID 4300 wrote to memory of 4432 4300 doskeyer.exe 109 PID 4300 wrote to memory of 4432 4300 doskeyer.exe 109 PID 4300 wrote to memory of 4400 4300 doskeyer.exe 110 PID 4300 wrote to memory of 4400 4300 doskeyer.exe 110 PID 4300 wrote to memory of 4400 4300 doskeyer.exe 110 PID 4432 wrote to memory of 2132 4432 doskeyer.exe 112 PID 4432 wrote to memory of 2132 4432 doskeyer.exe 112 PID 4432 wrote to memory of 2132 4432 doskeyer.exe 112 PID 4432 wrote to memory of 4436 4432 doskeyer.exe 140 PID 4432 wrote to memory of 4436 4432 doskeyer.exe 140 PID 4432 wrote to memory of 4436 4432 doskeyer.exe 140 PID 2132 wrote to memory of 3524 2132 doskeyer.exe 117 PID 2132 wrote to memory of 3524 2132 doskeyer.exe 117 PID 2132 wrote to memory of 3524 2132 doskeyer.exe 117 PID 2132 wrote to memory of 4752 2132 doskeyer.exe 144
Processes
-
C:\Users\Admin\AppData\Local\Temp\241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\241aba51527cb35faa2e52e798305eab_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3276 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3524 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2072 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"16⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1616 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"18⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:636 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"19⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4980 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3120 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3332 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"25⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"26⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4256 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4836 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"29⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1900 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2388 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3300 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"32⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3124 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3252 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"36⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1620 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"37⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1960 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:640 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"39⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1636 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"40⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4020 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3472 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:372 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"46⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4344 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"48⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1632 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3972 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"51⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3996 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4924 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4132 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"57⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3264 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4900 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4544 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"60⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4308 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"62⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:708 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"63⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2472 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4324 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"66⤵
- Drops file in System32 directory
PID:2564 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"67⤵PID:208
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"68⤵PID:3656
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"69⤵
- Checks computer location settings
PID:4936 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"70⤵
- Checks computer location settings
PID:4940 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"71⤵
- Checks computer location settings
- Adds Run key to start application
PID:2548 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"72⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3152 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"73⤵
- Adds Run key to start application
- Modifies registry class
PID:2360 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"74⤵
- Checks computer location settings
- Modifies registry class
PID:412 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"75⤵
- Modifies registry class
PID:4372 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"76⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5064 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"77⤵
- Checks computer location settings
PID:648 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"78⤵PID:3828
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"79⤵PID:5044
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"80⤵
- Adds Run key to start application
PID:2548 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"81⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3784 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"82⤵
- Checks computer location settings
PID:1788 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"83⤵
- Drops file in System32 directory
- Modifies registry class
PID:2388 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"84⤵
- Modifies registry class
PID:1852 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"85⤵PID:4756
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"86⤵PID:3540
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"87⤵
- Modifies registry class
PID:4668 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"88⤵
- Checks computer location settings
- Adds Run key to start application
PID:952 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"89⤵
- Checks computer location settings
PID:4304 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"90⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3308 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"91⤵PID:4852
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"92⤵
- Adds Run key to start application
PID:208 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"93⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1012 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"94⤵
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"95⤵
- Drops file in System32 directory
PID:4056 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"96⤵
- Drops file in System32 directory
- Modifies registry class
PID:4032 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"97⤵PID:3552
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"98⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:4748 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"99⤵
- Drops file in System32 directory
- Modifies registry class
PID:1084 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"100⤵
- Checks computer location settings
- Adds Run key to start application
PID:2268 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"101⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4004 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"102⤵
- Checks computer location settings
PID:3208 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"103⤵
- Drops file in System32 directory
PID:2092 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"104⤵
- Checks computer location settings
PID:2492 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"105⤵
- Checks computer location settings
- Modifies registry class
PID:3972 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"106⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:748 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"107⤵
- Adds Run key to start application
- Modifies registry class
PID:372 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"108⤵
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"109⤵PID:2388
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"110⤵PID:3536
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"111⤵
- Drops file in System32 directory
PID:3224 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"112⤵
- Adds Run key to start application
PID:2460 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"113⤵PID:4812
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"114⤵
- Adds Run key to start application
PID:4280 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"115⤵
- Checks computer location settings
- Modifies registry class
PID:224 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"116⤵PID:4404
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"117⤵PID:1276
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"118⤵
- Checks computer location settings
PID:2908 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"119⤵
- Modifies registry class
PID:4448 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"120⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2288 -
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"121⤵PID:3672
-
C:\Windows\SysWOW64\doskeyer.exe"C:\Windows\system32\doskeyer.exe"122⤵PID:4500
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-