Analysis
-
max time kernel
72s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
10/07/2024, 18:08
Behavioral task
behavioral1
Sample
35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe
-
Size
70KB
-
MD5
35d11b5fc3ecb74ca8a37116f9b4379d
-
SHA1
76dde20a32955620e212f4e5ed7abecb0cbfb667
-
SHA256
3cdb68c5195e98f7beb68a3e0008a2e6e09933d0fc38505a617eeacc18d50352
-
SHA512
34652d425902a99e8a83b2886448acad7eab921bf18b3c78af6aecb131699b6624c0bbb34e37df496cd1364a4a1a315f721095cbdad64013f8ce97eefc3eef65
-
SSDEEP
1536:O/dI+gjVU6VasTy3YD3P8ktmEtLhS8P/2gh9qO3s5SWUdgrTMG2U0/3GDvi:tSQasT/hS8n2KqO3sFU+rTm2Ti
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe Key value queried \REGISTRY\USER\S-1-5-21-2636447293-1148739154-93880854-1000\Control Panel\International\Geo\Nation sntsvc.exe -
Executes dropped EXE 64 IoCs
pid Process 220 sntsvc.exe 4528 sntsvc.exe 3224 sntsvc.exe 3052 sntsvc.exe 4504 sntsvc.exe 1760 sntsvc.exe 688 sntsvc.exe 2512 sntsvc.exe 4692 sntsvc.exe 1212 sntsvc.exe 3076 sntsvc.exe 3300 sntsvc.exe 4456 sntsvc.exe 1476 sntsvc.exe 920 sntsvc.exe 772 sntsvc.exe 3416 sntsvc.exe 3400 sntsvc.exe 2832 sntsvc.exe 440 sntsvc.exe 1792 sntsvc.exe 2596 sntsvc.exe 4504 sntsvc.exe 4368 sntsvc.exe 4100 sntsvc.exe 1604 sntsvc.exe 3140 sntsvc.exe 1100 sntsvc.exe 4792 sntsvc.exe 3828 sntsvc.exe 4592 sntsvc.exe 1760 sntsvc.exe 3112 sntsvc.exe 4800 sntsvc.exe 3692 sntsvc.exe 2948 sntsvc.exe 3532 sntsvc.exe 2060 sntsvc.exe 1204 sntsvc.exe 1740 sntsvc.exe 4376 sntsvc.exe 2960 sntsvc.exe 3980 sntsvc.exe 4296 sntsvc.exe 2344 sntsvc.exe 4880 sntsvc.exe 1888 sntsvc.exe 3960 sntsvc.exe 720 sntsvc.exe 4568 sntsvc.exe 3656 sntsvc.exe 2352 sntsvc.exe 2464 sntsvc.exe 4492 sntsvc.exe 1064 sntsvc.exe 3060 sntsvc.exe 4628 sntsvc.exe 932 sntsvc.exe 3056 sntsvc.exe 1840 sntsvc.exe 2648 sntsvc.exe 3384 sntsvc.exe 2336 sntsvc.exe 4892 sntsvc.exe -
resource yara_rule behavioral2/memory/3068-0-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3068-1-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/files/0x000900000002346d-7.dat upx behavioral2/memory/220-37-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3068-39-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4528-44-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/220-43-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3224-47-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4528-49-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3224-53-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4504-58-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3052-57-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4504-62-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1760-63-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1760-67-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/688-68-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/688-73-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/2512-74-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/2512-78-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4692-79-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4692-83-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1212-84-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3076-89-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1212-88-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3076-92-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3300-93-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3300-97-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4456-101-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1476-102-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1476-106-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/772-111-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/920-110-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3416-115-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/772-114-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3416-119-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3400-123-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/2832-124-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/2832-128-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/440-129-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1792-134-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/440-133-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1792-138-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/2596-139-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4504-142-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/2596-143-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4368-149-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4504-148-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4100-154-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4368-153-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4100-158-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1604-157-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3140-163-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1604-162-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3140-167-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1100-168-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1100-173-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4792-177-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3828-178-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4592-183-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3828-182-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/4592-187-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1760-188-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/3112-193-0x0000000000400000-0x000000000042B000-memory.dmp upx behavioral2/memory/1760-192-0x0000000000400000-0x000000000042B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Event Section = "sntsvc.exe" sntsvc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File created C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe File opened for modification C:\Windows\SysWOW64\sntsvc.exe sntsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ sntsvc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 220 sntsvc.exe Token: SeIncBasePriorityPrivilege 4528 sntsvc.exe Token: SeIncBasePriorityPrivilege 3224 sntsvc.exe Token: SeIncBasePriorityPrivilege 3052 sntsvc.exe Token: SeIncBasePriorityPrivilege 4504 sntsvc.exe Token: SeIncBasePriorityPrivilege 1760 sntsvc.exe Token: SeIncBasePriorityPrivilege 688 sntsvc.exe Token: SeIncBasePriorityPrivilege 2512 sntsvc.exe Token: SeIncBasePriorityPrivilege 4692 sntsvc.exe Token: SeIncBasePriorityPrivilege 1212 sntsvc.exe Token: SeIncBasePriorityPrivilege 3076 sntsvc.exe Token: SeIncBasePriorityPrivilege 3300 sntsvc.exe Token: SeIncBasePriorityPrivilege 4456 sntsvc.exe Token: SeIncBasePriorityPrivilege 1476 sntsvc.exe Token: SeIncBasePriorityPrivilege 920 sntsvc.exe Token: SeIncBasePriorityPrivilege 772 sntsvc.exe Token: SeIncBasePriorityPrivilege 3416 sntsvc.exe Token: SeIncBasePriorityPrivilege 3400 sntsvc.exe Token: SeIncBasePriorityPrivilege 2832 sntsvc.exe Token: SeIncBasePriorityPrivilege 440 sntsvc.exe Token: SeIncBasePriorityPrivilege 1792 sntsvc.exe Token: SeIncBasePriorityPrivilege 2596 sntsvc.exe Token: SeIncBasePriorityPrivilege 4504 sntsvc.exe Token: SeIncBasePriorityPrivilege 4368 sntsvc.exe Token: SeIncBasePriorityPrivilege 4100 sntsvc.exe Token: SeIncBasePriorityPrivilege 1604 sntsvc.exe Token: SeIncBasePriorityPrivilege 3140 sntsvc.exe Token: SeIncBasePriorityPrivilege 1100 sntsvc.exe Token: SeIncBasePriorityPrivilege 4792 sntsvc.exe Token: SeIncBasePriorityPrivilege 3828 sntsvc.exe Token: SeIncBasePriorityPrivilege 4592 sntsvc.exe Token: SeIncBasePriorityPrivilege 1760 sntsvc.exe Token: SeIncBasePriorityPrivilege 3112 sntsvc.exe Token: SeIncBasePriorityPrivilege 4800 sntsvc.exe Token: SeIncBasePriorityPrivilege 3692 sntsvc.exe Token: SeIncBasePriorityPrivilege 2948 sntsvc.exe Token: SeIncBasePriorityPrivilege 3532 sntsvc.exe Token: SeIncBasePriorityPrivilege 2060 sntsvc.exe Token: SeIncBasePriorityPrivilege 1204 sntsvc.exe Token: SeIncBasePriorityPrivilege 1740 sntsvc.exe Token: SeIncBasePriorityPrivilege 4376 sntsvc.exe Token: SeIncBasePriorityPrivilege 2960 sntsvc.exe Token: SeIncBasePriorityPrivilege 3980 sntsvc.exe Token: SeIncBasePriorityPrivilege 4296 sntsvc.exe Token: SeIncBasePriorityPrivilege 2344 sntsvc.exe Token: SeIncBasePriorityPrivilege 4880 sntsvc.exe Token: SeIncBasePriorityPrivilege 1888 sntsvc.exe Token: SeIncBasePriorityPrivilege 3960 sntsvc.exe Token: SeIncBasePriorityPrivilege 720 sntsvc.exe Token: SeIncBasePriorityPrivilege 4568 sntsvc.exe Token: SeIncBasePriorityPrivilege 3656 sntsvc.exe Token: SeIncBasePriorityPrivilege 2352 sntsvc.exe Token: SeIncBasePriorityPrivilege 2464 sntsvc.exe Token: SeIncBasePriorityPrivilege 4492 sntsvc.exe Token: SeIncBasePriorityPrivilege 1064 sntsvc.exe Token: SeIncBasePriorityPrivilege 3060 sntsvc.exe Token: SeIncBasePriorityPrivilege 4628 sntsvc.exe Token: SeIncBasePriorityPrivilege 932 sntsvc.exe Token: SeIncBasePriorityPrivilege 3056 sntsvc.exe Token: SeIncBasePriorityPrivilege 1840 sntsvc.exe Token: SeIncBasePriorityPrivilege 2648 sntsvc.exe Token: SeIncBasePriorityPrivilege 3384 sntsvc.exe Token: SeIncBasePriorityPrivilege 2336 sntsvc.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3068 wrote to memory of 220 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe 85 PID 3068 wrote to memory of 220 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe 85 PID 3068 wrote to memory of 220 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe 85 PID 3068 wrote to memory of 392 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe 86 PID 3068 wrote to memory of 392 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe 86 PID 3068 wrote to memory of 392 3068 35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe 86 PID 220 wrote to memory of 4528 220 sntsvc.exe 88 PID 220 wrote to memory of 4528 220 sntsvc.exe 88 PID 220 wrote to memory of 4528 220 sntsvc.exe 88 PID 220 wrote to memory of 3644 220 sntsvc.exe 89 PID 220 wrote to memory of 3644 220 sntsvc.exe 89 PID 220 wrote to memory of 3644 220 sntsvc.exe 89 PID 4528 wrote to memory of 3224 4528 sntsvc.exe 91 PID 4528 wrote to memory of 3224 4528 sntsvc.exe 91 PID 4528 wrote to memory of 3224 4528 sntsvc.exe 91 PID 4528 wrote to memory of 2768 4528 sntsvc.exe 92 PID 4528 wrote to memory of 2768 4528 sntsvc.exe 92 PID 4528 wrote to memory of 2768 4528 sntsvc.exe 92 PID 3224 wrote to memory of 3052 3224 sntsvc.exe 94 PID 3224 wrote to memory of 3052 3224 sntsvc.exe 94 PID 3224 wrote to memory of 3052 3224 sntsvc.exe 94 PID 3224 wrote to memory of 4688 3224 sntsvc.exe 95 PID 3224 wrote to memory of 4688 3224 sntsvc.exe 95 PID 3224 wrote to memory of 4688 3224 sntsvc.exe 95 PID 3052 wrote to memory of 4504 3052 sntsvc.exe 97 PID 3052 wrote to memory of 4504 3052 sntsvc.exe 97 PID 3052 wrote to memory of 4504 3052 sntsvc.exe 97 PID 3052 wrote to memory of 3996 3052 sntsvc.exe 98 PID 3052 wrote to memory of 3996 3052 sntsvc.exe 98 PID 3052 wrote to memory of 3996 3052 sntsvc.exe 98 PID 4504 wrote to memory of 1760 4504 sntsvc.exe 100 PID 4504 wrote to memory of 1760 4504 sntsvc.exe 100 PID 4504 wrote to memory of 1760 4504 sntsvc.exe 100 PID 4504 wrote to memory of 3836 4504 sntsvc.exe 101 PID 4504 wrote to memory of 3836 4504 sntsvc.exe 101 PID 4504 wrote to memory of 3836 4504 sntsvc.exe 101 PID 1760 wrote to memory of 688 1760 sntsvc.exe 103 PID 1760 wrote to memory of 688 1760 sntsvc.exe 103 PID 1760 wrote to memory of 688 1760 sntsvc.exe 103 PID 1760 wrote to memory of 4344 1760 sntsvc.exe 104 PID 1760 wrote to memory of 4344 1760 sntsvc.exe 104 PID 1760 wrote to memory of 4344 1760 sntsvc.exe 104 PID 688 wrote to memory of 2512 688 sntsvc.exe 106 PID 688 wrote to memory of 2512 688 sntsvc.exe 106 PID 688 wrote to memory of 2512 688 sntsvc.exe 106 PID 688 wrote to memory of 2920 688 sntsvc.exe 107 PID 688 wrote to memory of 2920 688 sntsvc.exe 107 PID 688 wrote to memory of 2920 688 sntsvc.exe 107 PID 2512 wrote to memory of 4692 2512 sntsvc.exe 109 PID 2512 wrote to memory of 4692 2512 sntsvc.exe 109 PID 2512 wrote to memory of 4692 2512 sntsvc.exe 109 PID 2512 wrote to memory of 2740 2512 sntsvc.exe 110 PID 2512 wrote to memory of 2740 2512 sntsvc.exe 110 PID 2512 wrote to memory of 2740 2512 sntsvc.exe 110 PID 4692 wrote to memory of 1212 4692 sntsvc.exe 112 PID 4692 wrote to memory of 1212 4692 sntsvc.exe 112 PID 4692 wrote to memory of 1212 4692 sntsvc.exe 112 PID 4692 wrote to memory of 220 4692 sntsvc.exe 113 PID 4692 wrote to memory of 220 4692 sntsvc.exe 113 PID 4692 wrote to memory of 220 4692 sntsvc.exe 113 PID 1212 wrote to memory of 3076 1212 sntsvc.exe 115 PID 1212 wrote to memory of 3076 1212 sntsvc.exe 115 PID 1212 wrote to memory of 3076 1212 sntsvc.exe 115 PID 1212 wrote to memory of 2776 1212 sntsvc.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\35d11b5fc3ecb74ca8a37116f9b4379d_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"6⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4504 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"11⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"12⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3076 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3300 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"14⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1476 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:772 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3416 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3400 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"20⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"23⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2596 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"24⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"25⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4368 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4100 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"27⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1604 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3140 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"29⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1100 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3828 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4592 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1760 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3112 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4800 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3692 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"37⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2948 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"38⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3532 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"40⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1204 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"41⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1740 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4376 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2960 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"44⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"45⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4296 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4880 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"48⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3960 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:720 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4568 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3656 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"53⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2464 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"55⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4492 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3060 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"58⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4628 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:932 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3056 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"61⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1840 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"62⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3384 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2336 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"65⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4892 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"66⤵
- Checks computer location settings
PID:4840 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"67⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3460 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"68⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4468 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"69⤵
- Checks computer location settings
- Modifies registry class
PID:3732 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"70⤵
- Checks computer location settings
- Adds Run key to start application
PID:1456 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"71⤵
- Drops file in System32 directory
PID:4636 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"72⤵
- Drops file in System32 directory
- Modifies registry class
PID:2964 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"73⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3188 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"74⤵
- Adds Run key to start application
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"75⤵
- Checks computer location settings
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"76⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2372 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"77⤵
- Checks computer location settings
- Modifies registry class
PID:1368 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"78⤵PID:1424
-
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"79⤵
- Drops file in System32 directory
PID:3600 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"80⤵
- Adds Run key to start application
PID:4220 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"81⤵
- Checks computer location settings
- Drops file in System32 directory
PID:4952 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"82⤵
- Modifies registry class
PID:2756 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"83⤵PID:3064
-
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"84⤵
- Checks computer location settings
PID:1760 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"85⤵
- Modifies registry class
PID:3756 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"86⤵
- Drops file in System32 directory
PID:220 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"87⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1864 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"88⤵
- Checks computer location settings
- Adds Run key to start application
PID:2324 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"89⤵
- Adds Run key to start application
- Modifies registry class
PID:2168 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"90⤵
- Adds Run key to start application
PID:3304 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"91⤵
- Adds Run key to start application
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"92⤵
- Drops file in System32 directory
- Modifies registry class
PID:856 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"93⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:4100 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"94⤵
- Drops file in System32 directory
PID:3448 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"95⤵
- Adds Run key to start application
- Modifies registry class
PID:220 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"96⤵
- Adds Run key to start application
PID:1864 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"97⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2324 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"98⤵
- Checks computer location settings
- Adds Run key to start application
PID:2040 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"99⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3300 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"100⤵
- Modifies registry class
PID:3912 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"101⤵
- Drops file in System32 directory
PID:1712 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"102⤵
- Adds Run key to start application
- Modifies registry class
PID:2948 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"103⤵
- Checks computer location settings
PID:2916 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"104⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:212 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"105⤵
- Adds Run key to start application
- Modifies registry class
PID:516 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"106⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3848 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"107⤵
- Drops file in System32 directory
PID:2044 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"108⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1972 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"109⤵
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4920 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"110⤵PID:3420
-
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"111⤵
- Adds Run key to start application
PID:652 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"112⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:1456 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"113⤵
- Modifies registry class
PID:3548 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"114⤵PID:2468
-
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"115⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4576 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"116⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2804 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"117⤵
- Checks computer location settings
PID:4368 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"118⤵
- Drops file in System32 directory
PID:2200 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"119⤵
- Adds Run key to start application
- Modifies registry class
PID:2584 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"120⤵
- Checks computer location settings
- Adds Run key to start application
PID:4580 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"121⤵
- Modifies registry class
PID:3384 -
C:\Windows\SysWOW64\sntsvc.exe"C:\Windows\system32\sntsvc.exe"122⤵
- Checks computer location settings
- Modifies registry class
PID:3368
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-