Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06/07/2024, 07:35
Static task
static1
Behavioral task
behavioral1
Sample
27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe
-
Size
42KB
-
MD5
27bed2b769dc018f0f0f329d7bd7f37b
-
SHA1
4f5f8985fe54ebae375bee381d95173166d5ac19
-
SHA256
8f2b1df6121a1aad9eecd3ce05146d2777ebeb439768add2d303657c6a4e0f60
-
SHA512
fedd890bbcf40eb1f2cbfe34f5cc2fd244659bd3ae53f8754dbcdcc31f4d15f9cd45ab27d2598c3d7ff61bc4695d83218cdd34662299cb9d3482f0f437ef8103
-
SSDEEP
768:Iehi6i18f3rIrRC6zjZj0YzI64MdOpkZ8Dew70T670Sg32L:rYq6CijU/j+kS+xL
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe File opened for modification C:\Windows\system32\drivers\etc\hosts nvsys86.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe Key value queried \REGISTRY\USER\S-1-5-21-2494989678-839960665-2515455429-1000\Control Panel\International\Geo\Nation nvsys86.exe -
Executes dropped EXE 64 IoCs
pid Process 3268 nvsys86.exe 1132 nvsys86.exe 1168 nvsys86.exe 2708 nvsys86.exe 1468 nvsys86.exe 4684 nvsys86.exe 3416 nvsys86.exe 5096 nvsys86.exe 4824 nvsys86.exe 2276 nvsys86.exe 4108 nvsys86.exe 2860 nvsys86.exe 3884 nvsys86.exe 2912 nvsys86.exe 4480 nvsys86.exe 2476 nvsys86.exe 3032 nvsys86.exe 1600 nvsys86.exe 1152 nvsys86.exe 620 nvsys86.exe 4328 nvsys86.exe 2908 nvsys86.exe 1624 nvsys86.exe 468 nvsys86.exe 4884 nvsys86.exe 4832 nvsys86.exe 3108 nvsys86.exe 4372 nvsys86.exe 1464 nvsys86.exe 2004 nvsys86.exe 4104 nvsys86.exe 2372 nvsys86.exe 1276 nvsys86.exe 4012 nvsys86.exe 4848 nvsys86.exe 3604 nvsys86.exe 3324 nvsys86.exe 2724 nvsys86.exe 920 nvsys86.exe 4524 nvsys86.exe 1892 nvsys86.exe 3524 nvsys86.exe 640 nvsys86.exe 4532 nvsys86.exe 3980 nvsys86.exe 1392 nvsys86.exe 2272 nvsys86.exe 3844 nvsys86.exe 5080 nvsys86.exe 744 nvsys86.exe 3076 nvsys86.exe 2688 nvsys86.exe 4840 nvsys86.exe 2976 nvsys86.exe 4504 nvsys86.exe 100 nvsys86.exe 4996 nvsys86.exe 2088 nvsys86.exe 1784 nvsys86.exe 4024 nvsys86.exe 1200 nvsys86.exe 3956 nvsys86.exe 4900 nvsys86.exe 4296 nvsys86.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\nVidia Display Drivers (x86) = "nvsys86.exe" nvsys86.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File opened for modification C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe File created C:\Windows\SysWOW64\nvsys86.exe nvsys86.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2812 set thread context of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 3268 set thread context of 1132 3268 nvsys86.exe 92 PID 1168 set thread context of 2708 1168 nvsys86.exe 107 PID 1468 set thread context of 4684 1468 nvsys86.exe 120 PID 3416 set thread context of 5096 3416 nvsys86.exe 132 PID 4824 set thread context of 2276 4824 nvsys86.exe 145 PID 4108 set thread context of 2860 4108 nvsys86.exe 153 PID 3884 set thread context of 2912 3884 nvsys86.exe 166 PID 4480 set thread context of 2476 4480 nvsys86.exe 352 PID 3032 set thread context of 1600 3032 nvsys86.exe 191 PID 1152 set thread context of 620 1152 nvsys86.exe 203 PID 4328 set thread context of 2908 4328 nvsys86.exe 215 PID 1624 set thread context of 468 1624 nvsys86.exe 225 PID 4884 set thread context of 4832 4884 nvsys86.exe 237 PID 3108 set thread context of 4372 3108 nvsys86.exe 249 PID 1464 set thread context of 2004 1464 nvsys86.exe 261 PID 4104 set thread context of 2372 4104 nvsys86.exe 734 PID 1276 set thread context of 4012 1276 nvsys86.exe 286 PID 4848 set thread context of 3604 4848 nvsys86.exe 533 PID 3324 set thread context of 2724 3324 nvsys86.exe 661 PID 920 set thread context of 4524 920 nvsys86.exe 322 PID 1892 set thread context of 3524 1892 nvsys86.exe 337 PID 640 set thread context of 4532 640 nvsys86.exe 349 PID 3980 set thread context of 1392 3980 nvsys86.exe 597 PID 2272 set thread context of 3844 2272 nvsys86.exe 914 PID 5080 set thread context of 744 5080 nvsys86.exe 381 PID 3076 set thread context of 2688 3076 nvsys86.exe 395 PID 4840 set thread context of 2976 4840 nvsys86.exe 923 PID 4504 set thread context of 100 4504 nvsys86.exe 887 PID 4996 set thread context of 2088 4996 nvsys86.exe 429 PID 1784 set thread context of 4024 1784 nvsys86.exe 440 PID 1200 set thread context of 3956 1200 nvsys86.exe 454 PID 4900 set thread context of 4296 4900 nvsys86.exe 466 PID 3604 set thread context of 5048 3604 nvsys86.exe 478 PID 4716 set thread context of 2328 4716 nvsys86.exe 1419 PID 2192 set thread context of 2984 2192 nvsys86.exe 504 PID 4660 set thread context of 1872 4660 nvsys86.exe 516 PID 3808 set thread context of 4592 3808 nvsys86.exe 527 PID 3660 set thread context of 3200 3660 nvsys86.exe 1360 PID 4108 set thread context of 4464 4108 nvsys86.exe 550 PID 688 set thread context of 4876 688 nvsys86.exe 562 PID 3080 set thread context of 4148 3080 nvsys86.exe 1622 PID 1396 set thread context of 4000 1396 nvsys86.exe 1588 PID 3304 set thread context of 1392 3304 nvsys86.exe 597 PID 3868 set thread context of 724 3868 nvsys86.exe 610 PID 2508 set thread context of 2092 2508 nvsys86.exe 621 PID 732 set thread context of 1352 732 nvsys86.exe 1791 PID 3376 set thread context of 1216 3376 nvsys86.exe 1647 PID 3580 set thread context of 3872 3580 nvsys86.exe 1886 PID 4376 set thread context of 2992 4376 nvsys86.exe 671 PID 2372 set thread context of 2820 2372 nvsys86.exe 1188 PID 2604 set thread context of 704 2604 nvsys86.exe 1822 PID 3768 set thread context of 3456 3768 nvsys86.exe 1682 PID 4820 set thread context of 1096 4820 nvsys86.exe 1770 PID 1100 set thread context of 3132 1100 nvsys86.exe 730 PID 1952 set thread context of 1996 1952 nvsys86.exe 2045 PID 2220 set thread context of 2812 2220 nvsys86.exe 1967 PID 2172 set thread context of 2016 2172 nvsys86.exe 766 PID 3300 set thread context of 1340 3300 nvsys86.exe 1793 PID 1612 set thread context of 2360 1612 nvsys86.exe 2243 PID 1468 set thread context of 732 1468 nvsys86.exe 801 PID 2976 set thread context of 4016 2976 nvsys86.exe 2317 PID 740 set thread context of 4992 740 nvsys86.exe 2016 PID 3300 set thread context of 536 3300 nvsys86.exe 2367 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ nvsys86.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1132 nvsys86.exe Token: SeIncBasePriorityPrivilege 2708 nvsys86.exe Token: SeIncBasePriorityPrivilege 4684 nvsys86.exe Token: SeIncBasePriorityPrivilege 5096 nvsys86.exe Token: SeIncBasePriorityPrivilege 2276 nvsys86.exe Token: SeIncBasePriorityPrivilege 2860 nvsys86.exe Token: SeIncBasePriorityPrivilege 2912 nvsys86.exe Token: SeIncBasePriorityPrivilege 2476 nvsys86.exe Token: SeIncBasePriorityPrivilege 1600 nvsys86.exe Token: SeIncBasePriorityPrivilege 620 nvsys86.exe Token: SeIncBasePriorityPrivilege 2908 nvsys86.exe Token: SeIncBasePriorityPrivilege 468 nvsys86.exe Token: SeIncBasePriorityPrivilege 4832 nvsys86.exe Token: SeIncBasePriorityPrivilege 4372 nvsys86.exe Token: SeIncBasePriorityPrivilege 2004 nvsys86.exe Token: SeIncBasePriorityPrivilege 2372 nvsys86.exe Token: SeIncBasePriorityPrivilege 4012 nvsys86.exe Token: SeIncBasePriorityPrivilege 3604 nvsys86.exe Token: SeIncBasePriorityPrivilege 2724 nvsys86.exe Token: SeIncBasePriorityPrivilege 4524 nvsys86.exe Token: SeIncBasePriorityPrivilege 3524 nvsys86.exe Token: SeIncBasePriorityPrivilege 4532 nvsys86.exe Token: SeIncBasePriorityPrivilege 1392 nvsys86.exe Token: SeIncBasePriorityPrivilege 3844 nvsys86.exe Token: SeIncBasePriorityPrivilege 744 nvsys86.exe Token: SeIncBasePriorityPrivilege 2688 nvsys86.exe Token: SeIncBasePriorityPrivilege 2976 nvsys86.exe Token: SeIncBasePriorityPrivilege 100 nvsys86.exe Token: SeIncBasePriorityPrivilege 2088 nvsys86.exe Token: SeIncBasePriorityPrivilege 4024 nvsys86.exe Token: SeIncBasePriorityPrivilege 3956 nvsys86.exe Token: SeIncBasePriorityPrivilege 4296 nvsys86.exe Token: SeIncBasePriorityPrivilege 5048 nvsys86.exe Token: SeIncBasePriorityPrivilege 2328 nvsys86.exe Token: SeIncBasePriorityPrivilege 2984 nvsys86.exe Token: SeIncBasePriorityPrivilege 1872 nvsys86.exe Token: SeIncBasePriorityPrivilege 4592 nvsys86.exe Token: SeIncBasePriorityPrivilege 3200 nvsys86.exe Token: SeIncBasePriorityPrivilege 4464 nvsys86.exe Token: SeIncBasePriorityPrivilege 4876 nvsys86.exe Token: SeIncBasePriorityPrivilege 4148 nvsys86.exe Token: SeIncBasePriorityPrivilege 4000 nvsys86.exe Token: SeIncBasePriorityPrivilege 1392 nvsys86.exe Token: SeIncBasePriorityPrivilege 724 nvsys86.exe Token: SeIncBasePriorityPrivilege 2092 nvsys86.exe Token: SeIncBasePriorityPrivilege 1352 nvsys86.exe Token: SeIncBasePriorityPrivilege 1216 nvsys86.exe Token: SeIncBasePriorityPrivilege 3872 nvsys86.exe Token: SeIncBasePriorityPrivilege 2992 nvsys86.exe Token: SeIncBasePriorityPrivilege 2820 nvsys86.exe Token: SeIncBasePriorityPrivilege 704 nvsys86.exe Token: SeIncBasePriorityPrivilege 3456 nvsys86.exe Token: SeIncBasePriorityPrivilege 1096 nvsys86.exe Token: SeIncBasePriorityPrivilege 3132 nvsys86.exe Token: SeIncBasePriorityPrivilege 1996 nvsys86.exe Token: SeIncBasePriorityPrivilege 2812 nvsys86.exe Token: SeIncBasePriorityPrivilege 2016 nvsys86.exe Token: SeIncBasePriorityPrivilege 1340 nvsys86.exe Token: SeIncBasePriorityPrivilege 2360 nvsys86.exe Token: SeIncBasePriorityPrivilege 732 nvsys86.exe Token: SeIncBasePriorityPrivilege 4016 nvsys86.exe Token: SeIncBasePriorityPrivilege 4992 nvsys86.exe Token: SeIncBasePriorityPrivilege 536 nvsys86.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 2812 wrote to memory of 4436 2812 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 82 PID 4436 wrote to memory of 3268 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 86 PID 4436 wrote to memory of 3268 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 86 PID 4436 wrote to memory of 3268 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 86 PID 4436 wrote to memory of 4324 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 87 PID 4436 wrote to memory of 4324 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 87 PID 4436 wrote to memory of 4324 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 87 PID 4436 wrote to memory of 5064 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5064 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 88 PID 4436 wrote to memory of 5064 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 88 PID 4436 wrote to memory of 2092 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 89 PID 4436 wrote to memory of 2092 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 89 PID 4436 wrote to memory of 2092 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 89 PID 4436 wrote to memory of 1824 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 90 PID 4436 wrote to memory of 1824 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 90 PID 4436 wrote to memory of 1824 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 90 PID 4436 wrote to memory of 3028 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 91 PID 4436 wrote to memory of 3028 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 91 PID 4436 wrote to memory of 3028 4436 27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe 91 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 3268 wrote to memory of 1132 3268 nvsys86.exe 92 PID 1132 wrote to memory of 1168 1132 nvsys86.exe 98 PID 1132 wrote to memory of 1168 1132 nvsys86.exe 98 PID 1132 wrote to memory of 1168 1132 nvsys86.exe 98 PID 1132 wrote to memory of 3288 1132 nvsys86.exe 99 PID 1132 wrote to memory of 3288 1132 nvsys86.exe 99 PID 1132 wrote to memory of 3288 1132 nvsys86.exe 99 PID 1132 wrote to memory of 832 1132 nvsys86.exe 100 PID 1132 wrote to memory of 832 1132 nvsys86.exe 100 PID 1132 wrote to memory of 832 1132 nvsys86.exe 100 PID 1132 wrote to memory of 512 1132 nvsys86.exe 161 PID 1132 wrote to memory of 512 1132 nvsys86.exe 161 PID 1132 wrote to memory of 512 1132 nvsys86.exe 161 PID 1132 wrote to memory of 468 1132 nvsys86.exe 160 PID 1132 wrote to memory of 468 1132 nvsys86.exe 160 PID 1132 wrote to memory of 468 1132 nvsys86.exe 160 PID 1132 wrote to memory of 3848 1132 nvsys86.exe 103 PID 1132 wrote to memory of 3848 1132 nvsys86.exe 103 PID 1132 wrote to memory of 3848 1132 nvsys86.exe 103 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 1168 wrote to memory of 2708 1168 nvsys86.exe 107 PID 2708 wrote to memory of 1468 2708 nvsys86.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\27bed2b769dc018f0f0f329d7bd7f37b_JaffaCakes118.exe"2⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3268 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"4⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"6⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1468 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"8⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4684 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3416 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"10⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5096 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4824 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4108 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"14⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3884 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"16⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4480 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"18⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3032 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"20⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1600 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1152 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"22⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:620 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4328 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"24⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2908 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1624 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"26⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:468 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4884 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4832 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3108 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"30⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4372 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1464 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"32⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4104 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"34⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1276 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4012 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4848 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3324 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"40⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2724 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:920 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"42⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4524 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1892 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"44⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3524 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:640 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"46⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3980 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3844 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5080 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:744 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3076 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"54⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2688 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4840 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"56⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2976 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4504 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"58⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:100 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4996 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"60⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1784 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"62⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1200 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3956 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4900 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"66⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"67⤵
- Suspicious use of SetThreadContext
PID:3604 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"68⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:5048 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"69⤵
- Suspicious use of SetThreadContext
PID:4716 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"70⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2328 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"71⤵
- Suspicious use of SetThreadContext
PID:2192 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"72⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2984 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"73⤵
- Suspicious use of SetThreadContext
PID:4660 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"74⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1872 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"75⤵
- Suspicious use of SetThreadContext
PID:3808 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"76⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4592 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"77⤵
- Suspicious use of SetThreadContext
PID:3660 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"78⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3200 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"79⤵
- Suspicious use of SetThreadContext
PID:4108 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"80⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4464 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"81⤵
- Suspicious use of SetThreadContext
PID:688 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"82⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"83⤵
- Suspicious use of SetThreadContext
PID:3080 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"84⤵
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4148 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"85⤵
- Suspicious use of SetThreadContext
PID:1396 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"86⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4000 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"87⤵
- Suspicious use of SetThreadContext
PID:3304 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"88⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1392 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"89⤵
- Suspicious use of SetThreadContext
PID:3868 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"90⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:724 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"91⤵
- Suspicious use of SetThreadContext
PID:2508 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"92⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2092 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"93⤵
- Suspicious use of SetThreadContext
PID:732 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"94⤵
- Suspicious use of AdjustPrivilegeToken
PID:1352 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"95⤵
- Suspicious use of SetThreadContext
PID:3376 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"96⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1216 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"97⤵
- Suspicious use of SetThreadContext
PID:3580 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"98⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"99⤵
- Suspicious use of SetThreadContext
PID:4376 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"100⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2992 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"101⤵
- Suspicious use of SetThreadContext
PID:2372 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"102⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2820 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"103⤵
- Suspicious use of SetThreadContext
PID:2604 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"104⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:704 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"105⤵
- Suspicious use of SetThreadContext
PID:3768 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"106⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3456 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"107⤵
- Suspicious use of SetThreadContext
PID:4820 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"108⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1096 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"109⤵
- Suspicious use of SetThreadContext
PID:1100 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"110⤵
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3132 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"111⤵
- Suspicious use of SetThreadContext
PID:1952 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"112⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"113⤵
- Suspicious use of SetThreadContext
PID:2220 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"114⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2812 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"115⤵
- Suspicious use of SetThreadContext
PID:2172 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"116⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2016 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"117⤵
- Suspicious use of SetThreadContext
PID:3300 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"118⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1340 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"119⤵
- Suspicious use of SetThreadContext
PID:1612 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"120⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2360 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\system32\nvsys86.exe"121⤵
- Suspicious use of SetThreadContext
PID:1468 -
C:\Windows\SysWOW64\nvsys86.exe"C:\Windows\SysWOW64\nvsys86.exe"122⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:732
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-