Analysis
-
max time kernel
149s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
12-07-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe
-
Size
404KB
-
MD5
3f329631c989465b4ebbfd388f318c41
-
SHA1
c89c6f13ebe029c68b781788a09d14b6493f14a5
-
SHA256
8545ad6343852321d4b27b5525a43bfe2c338a5a99ca0cb95dcb5a2f224a40b0
-
SHA512
6e07bfad5ba0a5710566a26c842c95ed7a509894f22d307420847be6700d491e1d18569085f805c0cea8847807153d9cc89c20d2ad8af62cd3b85c9db33f0d78
-
SSDEEP
1536:+5unRtH3imqV74A6J6SQEh+/sLbaRhdsRxOV:YQRt5qV7WYSQEhWsLbajLV
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 3076 userinit.exe 212 system.exe 2924 system.exe 5012 system.exe 4680 system.exe 2324 system.exe 3120 system.exe 852 system.exe 2084 system.exe 3800 system.exe 396 system.exe 3068 system.exe 1212 system.exe 3168 system.exe 2828 system.exe 4652 system.exe 3320 system.exe 748 system.exe 3696 system.exe 1620 system.exe 4048 system.exe 1544 system.exe 2128 system.exe 3844 system.exe 2220 system.exe 2156 system.exe 2560 system.exe 4488 system.exe 4264 system.exe 112 system.exe 4416 system.exe 3256 system.exe 2076 system.exe 4728 system.exe 1732 system.exe 116 system.exe 4456 system.exe 3380 system.exe 4004 system.exe 1324 system.exe 4564 system.exe 2744 system.exe 4452 system.exe 3168 system.exe 2448 system.exe 2988 system.exe 3872 system.exe 3992 system.exe 3940 system.exe 4580 system.exe 4976 system.exe 4460 system.exe 3588 system.exe 4636 system.exe 5000 system.exe 632 system.exe 4032 system.exe 1300 system.exe 2440 system.exe 2044 system.exe 112 system.exe 4372 system.exe 1688 system.exe 4560 system.exe -
Loads dropped DLL 1 IoCs
pid Process 2648 Regsvr32.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\MSWINSCK.OCX userinit.exe File created C:\Windows\SysWOW64\system.exe userinit.exe File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\userinit.exe 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3996 2648 WerFault.exe 84 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 3076 userinit.exe 3076 userinit.exe 3076 userinit.exe 3076 userinit.exe 212 system.exe 212 system.exe 3076 userinit.exe 3076 userinit.exe 2924 system.exe 2924 system.exe 3076 userinit.exe 3076 userinit.exe 5012 system.exe 5012 system.exe 3076 userinit.exe 3076 userinit.exe 4680 system.exe 4680 system.exe 3076 userinit.exe 3076 userinit.exe 2324 system.exe 2324 system.exe 3076 userinit.exe 3076 userinit.exe 3120 system.exe 3120 system.exe 3076 userinit.exe 3076 userinit.exe 852 system.exe 852 system.exe 3076 userinit.exe 3076 userinit.exe 2084 system.exe 2084 system.exe 3076 userinit.exe 3076 userinit.exe 3800 system.exe 3800 system.exe 3076 userinit.exe 3076 userinit.exe 396 system.exe 396 system.exe 3076 userinit.exe 3076 userinit.exe 3068 system.exe 3068 system.exe 3076 userinit.exe 3076 userinit.exe 1212 system.exe 1212 system.exe 3076 userinit.exe 3076 userinit.exe 3168 system.exe 3168 system.exe 3076 userinit.exe 3076 userinit.exe 2828 system.exe 2828 system.exe 3076 userinit.exe 3076 userinit.exe 4652 system.exe 4652 system.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 3076 userinit.exe 3076 userinit.exe 212 system.exe 212 system.exe 2924 system.exe 2924 system.exe 5012 system.exe 5012 system.exe 4680 system.exe 4680 system.exe 2324 system.exe 2324 system.exe 3120 system.exe 3120 system.exe 852 system.exe 852 system.exe 2084 system.exe 2084 system.exe 3800 system.exe 3800 system.exe 396 system.exe 396 system.exe 3068 system.exe 3068 system.exe 1212 system.exe 1212 system.exe 3168 system.exe 3168 system.exe 2828 system.exe 2828 system.exe 4652 system.exe 4652 system.exe 3320 system.exe 3320 system.exe 748 system.exe 748 system.exe 3696 system.exe 3696 system.exe 1620 system.exe 1620 system.exe 4048 system.exe 4048 system.exe 1544 system.exe 1544 system.exe 2128 system.exe 2128 system.exe 3844 system.exe 3844 system.exe 2220 system.exe 2220 system.exe 2156 system.exe 2156 system.exe 2560 system.exe 2560 system.exe 4488 system.exe 4488 system.exe 4264 system.exe 4264 system.exe 112 system.exe 112 system.exe 4416 system.exe 4416 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1568 wrote to memory of 3076 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 83 PID 1568 wrote to memory of 3076 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 83 PID 1568 wrote to memory of 3076 1568 3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe 83 PID 3076 wrote to memory of 2648 3076 userinit.exe 84 PID 3076 wrote to memory of 2648 3076 userinit.exe 84 PID 3076 wrote to memory of 2648 3076 userinit.exe 84 PID 3076 wrote to memory of 212 3076 userinit.exe 91 PID 3076 wrote to memory of 212 3076 userinit.exe 91 PID 3076 wrote to memory of 212 3076 userinit.exe 91 PID 3076 wrote to memory of 2924 3076 userinit.exe 92 PID 3076 wrote to memory of 2924 3076 userinit.exe 92 PID 3076 wrote to memory of 2924 3076 userinit.exe 92 PID 3076 wrote to memory of 5012 3076 userinit.exe 93 PID 3076 wrote to memory of 5012 3076 userinit.exe 93 PID 3076 wrote to memory of 5012 3076 userinit.exe 93 PID 3076 wrote to memory of 4680 3076 userinit.exe 94 PID 3076 wrote to memory of 4680 3076 userinit.exe 94 PID 3076 wrote to memory of 4680 3076 userinit.exe 94 PID 3076 wrote to memory of 2324 3076 userinit.exe 95 PID 3076 wrote to memory of 2324 3076 userinit.exe 95 PID 3076 wrote to memory of 2324 3076 userinit.exe 95 PID 3076 wrote to memory of 3120 3076 userinit.exe 96 PID 3076 wrote to memory of 3120 3076 userinit.exe 96 PID 3076 wrote to memory of 3120 3076 userinit.exe 96 PID 3076 wrote to memory of 852 3076 userinit.exe 97 PID 3076 wrote to memory of 852 3076 userinit.exe 97 PID 3076 wrote to memory of 852 3076 userinit.exe 97 PID 3076 wrote to memory of 2084 3076 userinit.exe 98 PID 3076 wrote to memory of 2084 3076 userinit.exe 98 PID 3076 wrote to memory of 2084 3076 userinit.exe 98 PID 3076 wrote to memory of 3800 3076 userinit.exe 99 PID 3076 wrote to memory of 3800 3076 userinit.exe 99 PID 3076 wrote to memory of 3800 3076 userinit.exe 99 PID 3076 wrote to memory of 396 3076 userinit.exe 100 PID 3076 wrote to memory of 396 3076 userinit.exe 100 PID 3076 wrote to memory of 396 3076 userinit.exe 100 PID 3076 wrote to memory of 3068 3076 userinit.exe 101 PID 3076 wrote to memory of 3068 3076 userinit.exe 101 PID 3076 wrote to memory of 3068 3076 userinit.exe 101 PID 3076 wrote to memory of 1212 3076 userinit.exe 102 PID 3076 wrote to memory of 1212 3076 userinit.exe 102 PID 3076 wrote to memory of 1212 3076 userinit.exe 102 PID 3076 wrote to memory of 3168 3076 userinit.exe 103 PID 3076 wrote to memory of 3168 3076 userinit.exe 103 PID 3076 wrote to memory of 3168 3076 userinit.exe 103 PID 3076 wrote to memory of 2828 3076 userinit.exe 104 PID 3076 wrote to memory of 2828 3076 userinit.exe 104 PID 3076 wrote to memory of 2828 3076 userinit.exe 104 PID 3076 wrote to memory of 4652 3076 userinit.exe 105 PID 3076 wrote to memory of 4652 3076 userinit.exe 105 PID 3076 wrote to memory of 4652 3076 userinit.exe 105 PID 3076 wrote to memory of 3320 3076 userinit.exe 106 PID 3076 wrote to memory of 3320 3076 userinit.exe 106 PID 3076 wrote to memory of 3320 3076 userinit.exe 106 PID 3076 wrote to memory of 748 3076 userinit.exe 107 PID 3076 wrote to memory of 748 3076 userinit.exe 107 PID 3076 wrote to memory of 748 3076 userinit.exe 107 PID 3076 wrote to memory of 3696 3076 userinit.exe 108 PID 3076 wrote to memory of 3696 3076 userinit.exe 108 PID 3076 wrote to memory of 3696 3076 userinit.exe 108 PID 3076 wrote to memory of 1620 3076 userinit.exe 109 PID 3076 wrote to memory of 1620 3076 userinit.exe 109 PID 3076 wrote to memory of 1620 3076 userinit.exe 109 PID 3076 wrote to memory of 4048 3076 userinit.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3f329631c989465b4ebbfd388f318c41_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1568 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Windows\SysWOW64\Regsvr32.exeRegsvr32 C:\Windows\system32\MSWINSCK.OCX /s3⤵
- Loads dropped DLL
PID:2648 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2648 -s 6044⤵
- Program crash
PID:3996
-
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3120
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:852
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2084
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3168
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4652
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3320
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3696
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3844
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4488
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4264
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4416
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3256
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2076
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4728
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1732
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:116
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4456
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3380
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4004
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3168
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2988
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3872
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3992
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3940
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4580
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4460
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3588
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4636
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5000
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:632
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2440
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2044
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4372
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1688
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1848
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:220
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4340
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:232
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4732
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2172
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2364
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2892
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3624
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2448
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3936
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1964
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3348
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:428
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4980
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4388
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4828
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:920
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4908
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4552
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3512
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2168
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1472
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1648
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4712
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4632
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4152
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:812
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4960
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4336
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:396
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4412
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4744
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2356
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4484
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:540
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4476
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4256
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3112
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4884
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4580
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4680
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4700
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2388
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3360
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4860
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1580
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2648 -ip 26481⤵PID:3308
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105KB
MD519514e83ff7b391e5d6a3876a4aa535b
SHA1de2c08563550d331049de540ddd931c0e88e30c1
SHA256f330826e0a60474a6f2cf1095b45fc05845d01845ab5bfb282e10750ec270abf
SHA5122c8c825f60cceac36027968081f7a9f84ee2260a6559d507855e8fa0629c368737d71c700b5a09c049f2f74443495b435517f54dba3ace0176e80eacfa0cb32b
-
Filesize
404KB
MD53f329631c989465b4ebbfd388f318c41
SHA1c89c6f13ebe029c68b781788a09d14b6493f14a5
SHA2568545ad6343852321d4b27b5525a43bfe2c338a5a99ca0cb95dcb5a2f224a40b0
SHA5126e07bfad5ba0a5710566a26c842c95ed7a509894f22d307420847be6700d491e1d18569085f805c0cea8847807153d9cc89c20d2ad8af62cd3b85c9db33f0d78