Analysis
-
max time kernel
150s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
14-07-2024 02:04
Static task
static1
Behavioral task
behavioral1
Sample
43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe
-
Size
80KB
-
MD5
43dcf05478833250d15ba492cf1ca381
-
SHA1
51a7df050834c19d7814a128d1b78ee133ce3e7f
-
SHA256
ffec80e33ca050c78c5af49a23b4943b68872b9bef75bbe75f4bf277fddec3f7
-
SHA512
14c81606af972ea7187efdecc3bc8dd1e299e41245f95134c3f522c6569b7f0292e862c986e956377db157f554c8943df82870fb3435aa7eddab186f07d38cae
-
SSDEEP
1536:C0FBV3gTCVEmMOet6HQHYnu3PpQ3aRhdsRxO4z:CWVe8EhO24nGPS3ajL4z
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\userinit.exe" userinit.exe -
Executes dropped EXE 64 IoCs
pid Process 4460 userinit.exe 4548 system.exe 2324 system.exe 4300 system.exe 2188 system.exe 4404 system.exe 3992 system.exe 1128 system.exe 1464 system.exe 3444 system.exe 3620 system.exe 1520 system.exe 2560 system.exe 4392 system.exe 3336 system.exe 4776 system.exe 3780 system.exe 4820 system.exe 212 system.exe 4340 system.exe 3384 system.exe 4804 system.exe 5068 system.exe 2640 system.exe 2580 system.exe 1924 system.exe 780 system.exe 3536 system.exe 968 system.exe 4656 system.exe 4248 system.exe 4064 system.exe 1128 system.exe 5088 system.exe 3576 system.exe 3296 system.exe 3520 system.exe 512 system.exe 5016 system.exe 920 system.exe 1032 system.exe 1572 system.exe 4820 system.exe 2216 system.exe 4472 system.exe 4892 system.exe 4804 system.exe 1772 system.exe 4060 system.exe 4548 system.exe 2292 system.exe 2324 system.exe 4300 system.exe 968 system.exe 2336 system.exe 3260 system.exe 5048 system.exe 1196 system.exe 976 system.exe 4644 system.exe 3064 system.exe 3672 system.exe 1520 system.exe 1964 system.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system.exe userinit.exe File created C:\Windows\SysWOW64\system.exe userinit.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\userinit.exe 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe File opened for modification C:\Windows\userinit.exe 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe File created C:\Windows\kdcoms.dll userinit.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 4460 userinit.exe 4460 userinit.exe 4460 userinit.exe 4460 userinit.exe 4548 system.exe 4548 system.exe 4460 userinit.exe 4460 userinit.exe 2324 system.exe 2324 system.exe 4460 userinit.exe 4460 userinit.exe 4300 system.exe 4300 system.exe 4460 userinit.exe 4460 userinit.exe 2188 system.exe 2188 system.exe 4460 userinit.exe 4460 userinit.exe 4404 system.exe 4404 system.exe 4460 userinit.exe 4460 userinit.exe 3992 system.exe 3992 system.exe 4460 userinit.exe 4460 userinit.exe 1128 system.exe 1128 system.exe 4460 userinit.exe 4460 userinit.exe 1464 system.exe 1464 system.exe 4460 userinit.exe 4460 userinit.exe 3444 system.exe 3444 system.exe 4460 userinit.exe 4460 userinit.exe 3620 system.exe 3620 system.exe 4460 userinit.exe 4460 userinit.exe 1520 system.exe 1520 system.exe 4460 userinit.exe 4460 userinit.exe 2560 system.exe 2560 system.exe 4460 userinit.exe 4460 userinit.exe 4392 system.exe 4392 system.exe 4460 userinit.exe 4460 userinit.exe 3336 system.exe 3336 system.exe 4460 userinit.exe 4460 userinit.exe 4776 system.exe 4776 system.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4460 userinit.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 4460 userinit.exe 4460 userinit.exe 4548 system.exe 4548 system.exe 2324 system.exe 2324 system.exe 4300 system.exe 4300 system.exe 2188 system.exe 2188 system.exe 4404 system.exe 4404 system.exe 3992 system.exe 3992 system.exe 1128 system.exe 1128 system.exe 1464 system.exe 1464 system.exe 3444 system.exe 3444 system.exe 3620 system.exe 3620 system.exe 1520 system.exe 1520 system.exe 2560 system.exe 2560 system.exe 4392 system.exe 4392 system.exe 3336 system.exe 3336 system.exe 4776 system.exe 4776 system.exe 3780 system.exe 3780 system.exe 4820 system.exe 4820 system.exe 212 system.exe 212 system.exe 4340 system.exe 4340 system.exe 3384 system.exe 3384 system.exe 4804 system.exe 4804 system.exe 5068 system.exe 5068 system.exe 2640 system.exe 2640 system.exe 2580 system.exe 2580 system.exe 1924 system.exe 1924 system.exe 780 system.exe 780 system.exe 3536 system.exe 3536 system.exe 968 system.exe 968 system.exe 4656 system.exe 4656 system.exe 4248 system.exe 4248 system.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 4460 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 85 PID 1640 wrote to memory of 4460 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 85 PID 1640 wrote to memory of 4460 1640 43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe 85 PID 4460 wrote to memory of 4548 4460 userinit.exe 89 PID 4460 wrote to memory of 4548 4460 userinit.exe 89 PID 4460 wrote to memory of 4548 4460 userinit.exe 89 PID 4460 wrote to memory of 2324 4460 userinit.exe 92 PID 4460 wrote to memory of 2324 4460 userinit.exe 92 PID 4460 wrote to memory of 2324 4460 userinit.exe 92 PID 4460 wrote to memory of 4300 4460 userinit.exe 94 PID 4460 wrote to memory of 4300 4460 userinit.exe 94 PID 4460 wrote to memory of 4300 4460 userinit.exe 94 PID 4460 wrote to memory of 2188 4460 userinit.exe 96 PID 4460 wrote to memory of 2188 4460 userinit.exe 96 PID 4460 wrote to memory of 2188 4460 userinit.exe 96 PID 4460 wrote to memory of 4404 4460 userinit.exe 97 PID 4460 wrote to memory of 4404 4460 userinit.exe 97 PID 4460 wrote to memory of 4404 4460 userinit.exe 97 PID 4460 wrote to memory of 3992 4460 userinit.exe 99 PID 4460 wrote to memory of 3992 4460 userinit.exe 99 PID 4460 wrote to memory of 3992 4460 userinit.exe 99 PID 4460 wrote to memory of 1128 4460 userinit.exe 100 PID 4460 wrote to memory of 1128 4460 userinit.exe 100 PID 4460 wrote to memory of 1128 4460 userinit.exe 100 PID 4460 wrote to memory of 1464 4460 userinit.exe 101 PID 4460 wrote to memory of 1464 4460 userinit.exe 101 PID 4460 wrote to memory of 1464 4460 userinit.exe 101 PID 4460 wrote to memory of 3444 4460 userinit.exe 103 PID 4460 wrote to memory of 3444 4460 userinit.exe 103 PID 4460 wrote to memory of 3444 4460 userinit.exe 103 PID 4460 wrote to memory of 3620 4460 userinit.exe 104 PID 4460 wrote to memory of 3620 4460 userinit.exe 104 PID 4460 wrote to memory of 3620 4460 userinit.exe 104 PID 4460 wrote to memory of 1520 4460 userinit.exe 105 PID 4460 wrote to memory of 1520 4460 userinit.exe 105 PID 4460 wrote to memory of 1520 4460 userinit.exe 105 PID 4460 wrote to memory of 2560 4460 userinit.exe 107 PID 4460 wrote to memory of 2560 4460 userinit.exe 107 PID 4460 wrote to memory of 2560 4460 userinit.exe 107 PID 4460 wrote to memory of 4392 4460 userinit.exe 108 PID 4460 wrote to memory of 4392 4460 userinit.exe 108 PID 4460 wrote to memory of 4392 4460 userinit.exe 108 PID 4460 wrote to memory of 3336 4460 userinit.exe 109 PID 4460 wrote to memory of 3336 4460 userinit.exe 109 PID 4460 wrote to memory of 3336 4460 userinit.exe 109 PID 4460 wrote to memory of 4776 4460 userinit.exe 110 PID 4460 wrote to memory of 4776 4460 userinit.exe 110 PID 4460 wrote to memory of 4776 4460 userinit.exe 110 PID 4460 wrote to memory of 3780 4460 userinit.exe 111 PID 4460 wrote to memory of 3780 4460 userinit.exe 111 PID 4460 wrote to memory of 3780 4460 userinit.exe 111 PID 4460 wrote to memory of 4820 4460 userinit.exe 112 PID 4460 wrote to memory of 4820 4460 userinit.exe 112 PID 4460 wrote to memory of 4820 4460 userinit.exe 112 PID 4460 wrote to memory of 212 4460 userinit.exe 113 PID 4460 wrote to memory of 212 4460 userinit.exe 113 PID 4460 wrote to memory of 212 4460 userinit.exe 113 PID 4460 wrote to memory of 4340 4460 userinit.exe 114 PID 4460 wrote to memory of 4340 4460 userinit.exe 114 PID 4460 wrote to memory of 4340 4460 userinit.exe 114 PID 4460 wrote to memory of 3384 4460 userinit.exe 115 PID 4460 wrote to memory of 3384 4460 userinit.exe 115 PID 4460 wrote to memory of 3384 4460 userinit.exe 115 PID 4460 wrote to memory of 4804 4460 userinit.exe 116
Processes
-
C:\Users\Admin\AppData\Local\Temp\43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\43dcf05478833250d15ba492cf1ca381_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\userinit.exeC:\Windows\userinit.exe2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4404
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3992
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3444
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3620
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4392
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3336
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:212
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4340
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3384
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:780
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3536
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4248
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1128
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5088
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3296
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:512
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5016
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:920
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1032
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1572
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2216
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4472
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4892
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4804
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1772
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2292
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:968
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:2336
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3260
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:5048
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1196
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:976
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:4644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3064
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:3672
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1520
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵
- Executes dropped EXE
PID:1964
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3932
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4168
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3496
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2472
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:936
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4948
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1724
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1644
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5068
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4560
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4060
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:388
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2668
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2324
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3356
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:984
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:364
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1300
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1452
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2012
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4808
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2936
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3820
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1132
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4792
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4584
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2072
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2592
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4860
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4288
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4800
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2576
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3884
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3564
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:408
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3328
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3224
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4764
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4020
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2124
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4148
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4336
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4440
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2180
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3548
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3892
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4260
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3464
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2740
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3896
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5100
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4340
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4928
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2284
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3776
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2344
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:3356
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1876
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:748
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:5108
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:2656
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:1480
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:4360
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:376
-
-
C:\Windows\SysWOW64\system.exeC:\Windows\system32\system.exe3⤵PID:364
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
80KB
MD543dcf05478833250d15ba492cf1ca381
SHA151a7df050834c19d7814a128d1b78ee133ce3e7f
SHA256ffec80e33ca050c78c5af49a23b4943b68872b9bef75bbe75f4bf277fddec3f7
SHA51214c81606af972ea7187efdecc3bc8dd1e299e41245f95134c3f522c6569b7f0292e862c986e956377db157f554c8943df82870fb3435aa7eddab186f07d38cae