Analysis
-
max time kernel
45s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe
-
Size
72KB
-
MD5
5df7b6914058320be1ecac739d32a4a7
-
SHA1
e4e867c32f36bba89fee537bde7d4c4934a3fe0d
-
SHA256
7451988910c8306e03cf10cebb4099cb360cf45685a175d67022cedb90be36a3
-
SHA512
3bfa6518383aa4a60caf27d363481b95e73f1aa7c40b615b025304d337711b82b7d78e1dd3c8e669bbaf25ebaeb0955e6f9aeda47a0eef93b81a1483d3fabf4b
-
SSDEEP
1536:+EXzfXeRZhjgu5VQrBanw5nTN8a9B1IuAbWhVtVmAKTwL:BPyhjguLQrTTN8a93I7b2DV7K8L
Malware Config
Signatures
-
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe -
Deletes itself 1 IoCs
pid Process 2896 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2164 symlsrvn.exe 2728 symlsrvn.exe 1884 symlsrvn.exe 1776 symlsrvn.exe 2204 symlsrvn.exe 340 symlsrvn.exe 952 symlsrvn.exe 656 symlsrvn.exe 2536 symlsrvn.exe 1576 symlsrvn.exe 2076 symlsrvn.exe 2840 symlsrvn.exe 2860 symlsrvn.exe 2900 symlsrvn.exe 2596 symlsrvn.exe 2052 symlsrvn.exe 1064 symlsrvn.exe 1672 symlsrvn.exe 1616 symlsrvn.exe 1932 symlsrvn.exe 2412 symlsrvn.exe 2776 symlsrvn.exe 3004 symlsrvn.exe 2860 symlsrvn.exe 2660 symlsrvn.exe 2920 symlsrvn.exe 1912 symlsrvn.exe 2420 symlsrvn.exe 1736 symlsrvn.exe 2572 symlsrvn.exe 1412 symlsrvn.exe 2536 symlsrvn.exe 2748 symlsrvn.exe 768 symlsrvn.exe 2876 symlsrvn.exe 2860 symlsrvn.exe 2184 symlsrvn.exe 2136 symlsrvn.exe 388 symlsrvn.exe 688 symlsrvn.exe 1492 symlsrvn.exe 1892 symlsrvn.exe 1852 symlsrvn.exe 2180 symlsrvn.exe 2852 symlsrvn.exe 2832 symlsrvn.exe 2772 symlsrvn.exe 1380 symlsrvn.exe 2056 symlsrvn.exe 1980 symlsrvn.exe 2240 symlsrvn.exe 2212 symlsrvn.exe 936 symlsrvn.exe 2756 symlsrvn.exe 2784 symlsrvn.exe 2568 symlsrvn.exe 1196 symlsrvn.exe 2344 symlsrvn.exe 2896 symlsrvn.exe 2296 symlsrvn.exe 1472 symlsrvn.exe 2156 symlsrvn.exe 1476 symlsrvn.exe 1792 symlsrvn.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe -
Loads dropped DLL 64 IoCs
pid Process 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 2164 symlsrvn.exe 2728 symlsrvn.exe 2728 symlsrvn.exe 1776 symlsrvn.exe 1776 symlsrvn.exe 340 symlsrvn.exe 340 symlsrvn.exe 656 symlsrvn.exe 656 symlsrvn.exe 1576 symlsrvn.exe 1576 symlsrvn.exe 2840 symlsrvn.exe 2840 symlsrvn.exe 2900 symlsrvn.exe 2900 symlsrvn.exe 2052 symlsrvn.exe 2052 symlsrvn.exe 1672 symlsrvn.exe 1672 symlsrvn.exe 1932 symlsrvn.exe 1932 symlsrvn.exe 2776 symlsrvn.exe 2776 symlsrvn.exe 2860 symlsrvn.exe 2860 symlsrvn.exe 2920 symlsrvn.exe 2920 symlsrvn.exe 2420 symlsrvn.exe 2420 symlsrvn.exe 2572 symlsrvn.exe 2572 symlsrvn.exe 2536 symlsrvn.exe 2536 symlsrvn.exe 768 symlsrvn.exe 768 symlsrvn.exe 2860 symlsrvn.exe 2860 symlsrvn.exe 2136 symlsrvn.exe 2136 symlsrvn.exe 688 symlsrvn.exe 688 symlsrvn.exe 1892 symlsrvn.exe 1892 symlsrvn.exe 2180 symlsrvn.exe 2180 symlsrvn.exe 2832 symlsrvn.exe 2832 symlsrvn.exe 1380 symlsrvn.exe 1380 symlsrvn.exe 1980 symlsrvn.exe 1980 symlsrvn.exe 2212 symlsrvn.exe 2212 symlsrvn.exe 2756 symlsrvn.exe 2756 symlsrvn.exe 2568 symlsrvn.exe 2568 symlsrvn.exe 2344 symlsrvn.exe 2344 symlsrvn.exe 2296 symlsrvn.exe 2296 symlsrvn.exe 2156 symlsrvn.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 1640 set thread context of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 2164 set thread context of 2728 2164 symlsrvn.exe 39 PID 1884 set thread context of 1776 1884 symlsrvn.exe 54 PID 2204 set thread context of 340 2204 symlsrvn.exe 66 PID 952 set thread context of 656 952 symlsrvn.exe 78 PID 2536 set thread context of 1576 2536 symlsrvn.exe 90 PID 2076 set thread context of 2840 2076 symlsrvn.exe 102 PID 2860 set thread context of 2900 2860 symlsrvn.exe 114 PID 2596 set thread context of 2052 2596 symlsrvn.exe 126 PID 1064 set thread context of 1672 1064 symlsrvn.exe 138 PID 1616 set thread context of 1932 1616 symlsrvn.exe 150 PID 2412 set thread context of 2776 2412 symlsrvn.exe 162 PID 3004 set thread context of 2860 3004 symlsrvn.exe 652 PID 2660 set thread context of 2920 2660 symlsrvn.exe 515 PID 1912 set thread context of 2420 1912 symlsrvn.exe 198 PID 1736 set thread context of 2572 1736 symlsrvn.exe 210 PID 1412 set thread context of 2536 1412 symlsrvn.exe 760 PID 2748 set thread context of 768 2748 symlsrvn.exe 234 PID 2876 set thread context of 2860 2876 symlsrvn.exe 780 PID 2184 set thread context of 2136 2184 symlsrvn.exe 259 PID 388 set thread context of 688 388 symlsrvn.exe 603 PID 1492 set thread context of 1892 1492 symlsrvn.exe 283 PID 1852 set thread context of 2180 1852 symlsrvn.exe 294 PID 2852 set thread context of 2832 2852 symlsrvn.exe 307 PID 2772 set thread context of 1380 2772 symlsrvn.exe 319 PID 2056 set thread context of 1980 2056 symlsrvn.exe 1040 PID 2240 set thread context of 2212 2240 symlsrvn.exe 932 PID 936 set thread context of 2756 936 symlsrvn.exe 948 PID 2784 set thread context of 2568 2784 symlsrvn.exe 1063 PID 1196 set thread context of 2344 1196 symlsrvn.exe 823 PID 2896 set thread context of 2296 2896 symlsrvn.exe 391 PID 1472 set thread context of 2156 1472 symlsrvn.exe 535 PID 1476 set thread context of 1792 1476 symlsrvn.exe 873 PID 2352 set thread context of 1536 2352 symlsrvn.exe 883 PID 2704 set thread context of 2912 2704 symlsrvn.exe 703 PID 3016 set thread context of 2772 3016 symlsrvn.exe 1384 PID 1440 set thread context of 2936 1440 symlsrvn.exe 463 PID 2944 set thread context of 1104 2944 symlsrvn.exe 1345 PID 1696 set thread context of 900 1696 symlsrvn.exe 1267 PID 968 set thread context of 2112 968 symlsrvn.exe 499 PID 944 set thread context of 2856 944 symlsrvn.exe 511 PID 620 set thread context of 2372 620 symlsrvn.exe 523 PID 2012 set thread context of 2156 2012 symlsrvn.exe 535 PID 892 set thread context of 2708 892 symlsrvn.exe 1415 PID 2436 set thread context of 2352 2436 symlsrvn.exe 1636 PID 2516 set thread context of 2912 2516 symlsrvn.exe 703 PID 1556 set thread context of 1008 1556 symlsrvn.exe 583 PID 620 set thread context of 1020 620 symlsrvn.exe 1802 PID 1484 set thread context of 2540 1484 symlsrvn.exe 607 PID 2480 set thread context of 884 2480 symlsrvn.exe 1311 PID 1016 set thread context of 2604 1016 symlsrvn.exe 1131 PID 2632 set thread context of 2576 2632 symlsrvn.exe 1730 PID 1976 set thread context of 2172 1976 symlsrvn.exe 1219 PID 1636 set thread context of 2312 1636 symlsrvn.exe 1531 PID 2100 set thread context of 1412 2100 symlsrvn.exe 1831 PID 2720 set thread context of 2168 2720 symlsrvn.exe 1999 PID 3004 set thread context of 2912 3004 symlsrvn.exe 703 PID 2768 set thread context of 3064 2768 symlsrvn.exe 1937 PID 684 set thread context of 2056 684 symlsrvn.exe 727 PID 2012 set thread context of 2944 2012 symlsrvn.exe 2142 PID 2108 set thread context of 2720 2108 symlsrvn.exe 2139 PID 2352 set thread context of 2260 2352 symlsrvn.exe 2028 PID 2644 set thread context of 3016 2644 symlsrvn.exe 2296 PID 2148 set thread context of 2160 2148 symlsrvn.exe 2511 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2728 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1776 symlsrvn.exe Token: SeIncBasePriorityPrivilege 340 symlsrvn.exe Token: SeIncBasePriorityPrivilege 656 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1576 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2840 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2900 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2052 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1672 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1932 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2776 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2860 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2920 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2420 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2572 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2536 symlsrvn.exe Token: SeIncBasePriorityPrivilege 768 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2860 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2136 symlsrvn.exe Token: SeIncBasePriorityPrivilege 688 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1892 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2180 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2832 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1380 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1980 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2212 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2756 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2568 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2344 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2296 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2156 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1792 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1536 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2912 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2772 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2936 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1104 symlsrvn.exe Token: SeIncBasePriorityPrivilege 900 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2112 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2856 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2372 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2156 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2708 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2352 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2912 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1008 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1020 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2540 symlsrvn.exe Token: SeIncBasePriorityPrivilege 884 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2604 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2576 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2172 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2312 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1412 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2168 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2912 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3064 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2056 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2944 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2720 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2260 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3016 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2160 symlsrvn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 1640 wrote to memory of 3056 1640 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 30 PID 3056 wrote to memory of 2164 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2164 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2164 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2164 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 31 PID 3056 wrote to memory of 2832 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 32 PID 3056 wrote to memory of 2832 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 32 PID 3056 wrote to memory of 2832 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 32 PID 3056 wrote to memory of 2832 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 32 PID 3056 wrote to memory of 2860 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 33 PID 3056 wrote to memory of 2860 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 33 PID 3056 wrote to memory of 2860 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 33 PID 3056 wrote to memory of 2860 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 33 PID 3056 wrote to memory of 2768 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 35 PID 3056 wrote to memory of 2768 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 35 PID 3056 wrote to memory of 2768 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 35 PID 3056 wrote to memory of 2768 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 35 PID 3056 wrote to memory of 2880 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 37 PID 3056 wrote to memory of 2880 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 37 PID 3056 wrote to memory of 2880 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 37 PID 3056 wrote to memory of 2880 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 37 PID 3056 wrote to memory of 2896 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 38 PID 3056 wrote to memory of 2896 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 38 PID 3056 wrote to memory of 2896 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 38 PID 3056 wrote to memory of 2896 3056 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 38 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2164 wrote to memory of 2728 2164 symlsrvn.exe 39 PID 2728 wrote to memory of 1884 2728 symlsrvn.exe 43 PID 2728 wrote to memory of 1884 2728 symlsrvn.exe 43 PID 2728 wrote to memory of 1884 2728 symlsrvn.exe 43 PID 2728 wrote to memory of 1884 2728 symlsrvn.exe 43 PID 2728 wrote to memory of 1192 2728 symlsrvn.exe 44 PID 2728 wrote to memory of 1192 2728 symlsrvn.exe 44 PID 2728 wrote to memory of 1192 2728 symlsrvn.exe 44 PID 2728 wrote to memory of 1192 2728 symlsrvn.exe 44 PID 2728 wrote to memory of 2920 2728 symlsrvn.exe 45 PID 2728 wrote to memory of 2920 2728 symlsrvn.exe 45 PID 2728 wrote to memory of 2920 2728 symlsrvn.exe 45 PID 2728 wrote to memory of 2920 2728 symlsrvn.exe 45 PID 2728 wrote to memory of 620 2728 symlsrvn.exe 47 PID 2728 wrote to memory of 620 2728 symlsrvn.exe 47 PID 2728 wrote to memory of 620 2728 symlsrvn.exe 47 PID 2728 wrote to memory of 620 2728 symlsrvn.exe 47 PID 2728 wrote to memory of 1992 2728 symlsrvn.exe 117 PID 2728 wrote to memory of 1992 2728 symlsrvn.exe 117 PID 2728 wrote to memory of 1992 2728 symlsrvn.exe 117 PID 2728 wrote to memory of 1992 2728 symlsrvn.exe 117 PID 2728 wrote to memory of 2904 2728 symlsrvn.exe 50 PID 2728 wrote to memory of 2904 2728 symlsrvn.exe 50
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"2⤵
- Drops file in Drivers directory
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1884 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2204 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:340 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:952 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"10⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:656 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2536 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"12⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1576 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2076 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2840 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2860 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"16⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2596 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"18⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2052 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1064 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"20⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1672 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1616 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"22⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1932 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2412 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"24⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2776 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2660 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"28⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2920 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"30⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2420 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1736 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"32⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1412 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"34⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2536 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2748 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"36⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:768 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2876 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"38⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2184 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"40⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:388 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"42⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:688 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1492 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1852 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"46⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2180 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2852 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"48⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2832 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2772 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"50⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1380 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2056 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"52⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1980 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2240 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"54⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2212 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:936 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"56⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2756 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2784 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"58⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2568 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1196 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2344 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2896 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"62⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2296 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1472 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"64⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1476 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"66⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"67⤵
- Suspicious use of SetThreadContext
PID:2352 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"68⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1536 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"69⤵
- Suspicious use of SetThreadContext
PID:2704 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"70⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"71⤵
- Suspicious use of SetThreadContext
PID:3016 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"72⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2772 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"73⤵
- Suspicious use of SetThreadContext
PID:1440 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"74⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"75⤵
- Suspicious use of SetThreadContext
PID:2944 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"76⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1104 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"77⤵
- Suspicious use of SetThreadContext
PID:1696 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"78⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:900 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"79⤵
- Suspicious use of SetThreadContext
PID:968 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"80⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2112 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"81⤵
- Suspicious use of SetThreadContext
PID:944 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"82⤵
- Suspicious use of AdjustPrivilegeToken
PID:2856 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"83⤵
- Suspicious use of SetThreadContext
PID:620 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"84⤵
- Suspicious use of AdjustPrivilegeToken
PID:2372 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"85⤵
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"86⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:2156 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"87⤵
- Suspicious use of SetThreadContext
PID:892 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"88⤵
- Disables RegEdit via registry modification
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2708 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"89⤵
- Suspicious use of SetThreadContext
PID:2436 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"90⤵
- Disables RegEdit via registry modification
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"91⤵
- Suspicious use of SetThreadContext
PID:2516 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"92⤵
- Disables RegEdit via registry modification
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"93⤵
- Suspicious use of SetThreadContext
PID:1556 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"94⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1008 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"95⤵
- Suspicious use of SetThreadContext
PID:620 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"96⤵
- Disables RegEdit via registry modification
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"97⤵
- Suspicious use of SetThreadContext
PID:1484 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"98⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2540 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"99⤵
- Suspicious use of SetThreadContext
PID:2480 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"100⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:884 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"101⤵
- Suspicious use of SetThreadContext
PID:1016 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"102⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"103⤵
- Suspicious use of SetThreadContext
PID:2632 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"104⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2576 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"105⤵
- Suspicious use of SetThreadContext
PID:1976 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"106⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2172 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"107⤵
- Suspicious use of SetThreadContext
PID:1636 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"108⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2312 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"109⤵
- Suspicious use of SetThreadContext
PID:2100 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"110⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"111⤵
- Suspicious use of SetThreadContext
PID:2720 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"112⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2168 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"113⤵
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"114⤵
- Suspicious use of AdjustPrivilegeToken
PID:2912 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"115⤵
- Suspicious use of SetThreadContext
PID:2768 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"116⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3064 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"117⤵
- Suspicious use of SetThreadContext
PID:684 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"118⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"119⤵
- Suspicious use of SetThreadContext
PID:2012 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"120⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2944 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"121⤵
- Suspicious use of SetThreadContext
PID:2108 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"122⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-