Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
47s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 22:37
Static task
static1
Behavioral task
behavioral1
Sample
5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe
Resource
win10v2004-20240709-en
General
-
Target
5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe
-
Size
72KB
-
MD5
5df7b6914058320be1ecac739d32a4a7
-
SHA1
e4e867c32f36bba89fee537bde7d4c4934a3fe0d
-
SHA256
7451988910c8306e03cf10cebb4099cb360cf45685a175d67022cedb90be36a3
-
SHA512
3bfa6518383aa4a60caf27d363481b95e73f1aa7c40b615b025304d337711b82b7d78e1dd3c8e669bbaf25ebaeb0955e6f9aeda47a0eef93b81a1483d3fabf4b
-
SSDEEP
1536:+EXzfXeRZhjgu5VQrBanw5nTN8a9B1IuAbWhVtVmAKTwL:BPyhjguLQrTTN8a93I7b2DV7K8L
Malware Config
Signatures
-
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe Set value (int) \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symlsrvn.exe -
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symlsrvn.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe Key value queried \REGISTRY\USER\S-1-5-21-464762018-485119342-1613148473-1000\Control Panel\International\Geo\Nation symlsrvn.exe -
Executes dropped EXE 64 IoCs
pid Process 244 symlsrvn.exe 3236 symlsrvn.exe 700 symlsrvn.exe 2332 symlsrvn.exe 5060 symlsrvn.exe 1684 symlsrvn.exe 2640 symlsrvn.exe 4820 symlsrvn.exe 2984 symlsrvn.exe 384 symlsrvn.exe 2092 symlsrvn.exe 4876 symlsrvn.exe 1576 symlsrvn.exe 3680 symlsrvn.exe 2644 symlsrvn.exe 432 symlsrvn.exe 5116 symlsrvn.exe 864 symlsrvn.exe 4948 symlsrvn.exe 1956 symlsrvn.exe 4380 symlsrvn.exe 4648 symlsrvn.exe 2892 symlsrvn.exe 1500 symlsrvn.exe 640 symlsrvn.exe 4232 symlsrvn.exe 2500 symlsrvn.exe 4552 symlsrvn.exe 4064 symlsrvn.exe 2644 symlsrvn.exe 4332 symlsrvn.exe 4112 symlsrvn.exe 3288 symlsrvn.exe 2648 symlsrvn.exe 5004 symlsrvn.exe 1180 symlsrvn.exe 4896 symlsrvn.exe 5056 symlsrvn.exe 312 symlsrvn.exe 3632 symlsrvn.exe 1796 symlsrvn.exe 2648 symlsrvn.exe 5112 symlsrvn.exe 4284 symlsrvn.exe 4332 symlsrvn.exe 4320 symlsrvn.exe 2232 symlsrvn.exe 2140 symlsrvn.exe 1036 symlsrvn.exe 404 symlsrvn.exe 2652 symlsrvn.exe 3136 symlsrvn.exe 5116 symlsrvn.exe 1916 symlsrvn.exe 4436 symlsrvn.exe 1056 symlsrvn.exe 5072 symlsrvn.exe 2860 symlsrvn.exe 1936 symlsrvn.exe 4740 symlsrvn.exe 4128 symlsrvn.exe 2648 symlsrvn.exe 2276 symlsrvn.exe 1640 symlsrvn.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec N-Protect Server = "symlsrvn.exe" symlsrvn.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File created C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe File opened for modification C:\Windows\SysWOW64\symlsrvn.exe symlsrvn.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2656 set thread context of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 244 set thread context of 3236 244 symlsrvn.exe 88 PID 700 set thread context of 2332 700 symlsrvn.exe 108 PID 5060 set thread context of 1684 5060 symlsrvn.exe 122 PID 2640 set thread context of 4820 2640 symlsrvn.exe 134 PID 2984 set thread context of 384 2984 symlsrvn.exe 146 PID 2092 set thread context of 4876 2092 symlsrvn.exe 160 PID 1576 set thread context of 3680 1576 symlsrvn.exe 172 PID 2644 set thread context of 432 2644 symlsrvn.exe 184 PID 5116 set thread context of 864 5116 symlsrvn.exe 197 PID 4948 set thread context of 1956 4948 symlsrvn.exe 209 PID 4380 set thread context of 4648 4380 symlsrvn.exe 222 PID 2892 set thread context of 1500 2892 symlsrvn.exe 479 PID 640 set thread context of 4232 640 symlsrvn.exe 246 PID 2500 set thread context of 4552 2500 symlsrvn.exe 657 PID 4064 set thread context of 2644 4064 symlsrvn.exe 271 PID 4332 set thread context of 4112 4332 symlsrvn.exe 283 PID 3288 set thread context of 2648 3288 symlsrvn.exe 465 PID 5004 set thread context of 1180 5004 symlsrvn.exe 393 PID 4896 set thread context of 5056 4896 symlsrvn.exe 319 PID 312 set thread context of 3632 312 symlsrvn.exe 331 PID 1796 set thread context of 2648 1796 symlsrvn.exe 465 PID 5112 set thread context of 4284 5112 symlsrvn.exe 527 PID 4332 set thread context of 4320 4332 symlsrvn.exe 368 PID 2232 set thread context of 2140 2232 symlsrvn.exe 851 PID 1036 set thread context of 404 1036 symlsrvn.exe 1166 PID 2652 set thread context of 3136 2652 symlsrvn.exe 1202 PID 5116 set thread context of 1916 5116 symlsrvn.exe 952 PID 4436 set thread context of 1056 4436 symlsrvn.exe 1210 PID 5072 set thread context of 2860 5072 symlsrvn.exe 1359 PID 1936 set thread context of 4740 1936 symlsrvn.exe 453 PID 4128 set thread context of 2648 4128 symlsrvn.exe 465 PID 2276 set thread context of 1640 2276 symlsrvn.exe 1708 PID 1500 set thread context of 2860 1500 symlsrvn.exe 1548 PID 1488 set thread context of 3168 1488 symlsrvn.exe 1281 PID 4588 set thread context of 372 4588 symlsrvn.exe 1381 PID 4036 set thread context of 2892 4036 symlsrvn.exe 525 PID 4284 set thread context of 3136 4284 symlsrvn.exe 1732 PID 3128 set thread context of 5104 3128 symlsrvn.exe 549 PID 1560 set thread context of 2276 1560 symlsrvn.exe 561 PID 456 set thread context of 3016 456 symlsrvn.exe 1189 PID 4760 set thread context of 4504 4760 symlsrvn.exe 585 PID 3624 set thread context of 4484 3624 symlsrvn.exe 2002 PID 2952 set thread context of 3540 2952 symlsrvn.exe 827 PID 4064 set thread context of 4656 4064 symlsrvn.exe 621 PID 3884 set thread context of 1844 3884 symlsrvn.exe 633 PID 3752 set thread context of 2716 3752 symlsrvn.exe 645 PID 2964 set thread context of 4552 2964 symlsrvn.exe 657 PID 776 set thread context of 4792 776 symlsrvn.exe 1985 PID 1856 set thread context of 4440 1856 symlsrvn.exe 681 PID 5016 set thread context of 3428 5016 symlsrvn.exe 2282 PID 1916 set thread context of 4812 1916 symlsrvn.exe 705 PID 1500 set thread context of 2808 1500 symlsrvn.exe 1258 PID 4736 set thread context of 1904 4736 symlsrvn.exe 730 PID 4456 set thread context of 2792 4456 symlsrvn.exe 2233 PID 4052 set thread context of 4684 4052 symlsrvn.exe 754 PID 3248 set thread context of 5016 3248 symlsrvn.exe 766 PID 2404 set thread context of 3492 2404 symlsrvn.exe 778 PID 1052 set thread context of 1936 1052 symlsrvn.exe 2257 PID 1072 set thread context of 1488 1072 symlsrvn.exe 802 PID 2488 set thread context of 1084 2488 symlsrvn.exe 2541 PID 4668 set thread context of 3900 4668 symlsrvn.exe 2585 PID 396 set thread context of 392 396 symlsrvn.exe 1153 PID 5052 set thread context of 2140 5052 symlsrvn.exe 1940 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ symlsrvn.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3236 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2332 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1684 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4820 symlsrvn.exe Token: SeIncBasePriorityPrivilege 384 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4876 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3680 symlsrvn.exe Token: SeIncBasePriorityPrivilege 432 symlsrvn.exe Token: SeIncBasePriorityPrivilege 864 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1956 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4648 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1500 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4232 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4552 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2644 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4112 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2648 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1180 symlsrvn.exe Token: SeIncBasePriorityPrivilege 5056 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3632 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2648 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4284 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4320 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2140 symlsrvn.exe Token: SeIncBasePriorityPrivilege 404 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3136 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1916 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1056 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2860 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4740 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2648 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1640 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2860 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3168 symlsrvn.exe Token: SeIncBasePriorityPrivilege 372 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2892 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3136 symlsrvn.exe Token: SeIncBasePriorityPrivilege 5104 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2276 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3016 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4504 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4484 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3540 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4656 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1844 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2716 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4552 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4792 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4440 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3428 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4812 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2808 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1904 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2792 symlsrvn.exe Token: SeIncBasePriorityPrivilege 4684 symlsrvn.exe Token: SeIncBasePriorityPrivilege 5016 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3492 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1936 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1488 symlsrvn.exe Token: SeIncBasePriorityPrivilege 1084 symlsrvn.exe Token: SeIncBasePriorityPrivilege 3900 symlsrvn.exe Token: SeIncBasePriorityPrivilege 392 symlsrvn.exe Token: SeIncBasePriorityPrivilege 2140 symlsrvn.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2656 wrote to memory of 2828 2656 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 84 PID 2828 wrote to memory of 244 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 87 PID 2828 wrote to memory of 244 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 87 PID 2828 wrote to memory of 244 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 87 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 244 wrote to memory of 3236 244 symlsrvn.exe 88 PID 2828 wrote to memory of 1112 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 89 PID 2828 wrote to memory of 1112 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 89 PID 2828 wrote to memory of 1112 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 89 PID 2828 wrote to memory of 4132 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 90 PID 2828 wrote to memory of 4132 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 90 PID 2828 wrote to memory of 4132 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 90 PID 2828 wrote to memory of 1616 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 92 PID 2828 wrote to memory of 1616 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 92 PID 2828 wrote to memory of 1616 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 92 PID 2828 wrote to memory of 2412 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 93 PID 2828 wrote to memory of 2412 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 93 PID 2828 wrote to memory of 2412 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 93 PID 2828 wrote to memory of 4360 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 95 PID 2828 wrote to memory of 4360 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 95 PID 2828 wrote to memory of 4360 2828 5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe 95 PID 3236 wrote to memory of 700 3236 symlsrvn.exe 98 PID 3236 wrote to memory of 700 3236 symlsrvn.exe 98 PID 3236 wrote to memory of 700 3236 symlsrvn.exe 98 PID 3236 wrote to memory of 2608 3236 symlsrvn.exe 99 PID 3236 wrote to memory of 2608 3236 symlsrvn.exe 99 PID 3236 wrote to memory of 2608 3236 symlsrvn.exe 99 PID 3236 wrote to memory of 920 3236 symlsrvn.exe 100 PID 3236 wrote to memory of 920 3236 symlsrvn.exe 100 PID 3236 wrote to memory of 920 3236 symlsrvn.exe 100 PID 3236 wrote to memory of 3576 3236 symlsrvn.exe 165 PID 3236 wrote to memory of 3576 3236 symlsrvn.exe 165 PID 3236 wrote to memory of 3576 3236 symlsrvn.exe 165 PID 3236 wrote to memory of 3492 3236 symlsrvn.exe 169 PID 3236 wrote to memory of 3492 3236 symlsrvn.exe 169 PID 3236 wrote to memory of 3492 3236 symlsrvn.exe 169 PID 3236 wrote to memory of 1472 3236 symlsrvn.exe 103 PID 3236 wrote to memory of 1472 3236 symlsrvn.exe 103 PID 3236 wrote to memory of 1472 3236 symlsrvn.exe 103 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 700 wrote to memory of 2332 700 symlsrvn.exe 108 PID 2332 wrote to memory of 5060 2332 symlsrvn.exe 112 PID 2332 wrote to memory of 5060 2332 symlsrvn.exe 112 PID 2332 wrote to memory of 5060 2332 symlsrvn.exe 112 PID 2332 wrote to memory of 4724 2332 symlsrvn.exe 231
Processes
-
C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5df7b6914058320be1ecac739d32a4a7_JaffaCakes118.exe"2⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Impair Defenses: Safe Mode Boot
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"4⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"6⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5060 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"8⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1684 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2640 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"10⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2984 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"12⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:384 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2092 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"14⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1576 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"16⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3680 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"18⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:432 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5116 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"20⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:864 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4948 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"22⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4380 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"24⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4648 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2892 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"26⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1500 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:640 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"28⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4232 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2500 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"30⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4552 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4064 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"32⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2644 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4332 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"34⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4112 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3288 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"36⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5004 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"38⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1180 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4896 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"40⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:312 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"42⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3632 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1796 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"44⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5112 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4284 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4332 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"48⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4320 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"50⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2140 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1036 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"52⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2652 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"54⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5116 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"56⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1916 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4436 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"58⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1056 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5072 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"60⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1936 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"62⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4740 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4128 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"64⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2648 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2276 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"66⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"67⤵
- Suspicious use of SetThreadContext
PID:1500 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"68⤵
- Disables RegEdit via registry modification
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2860 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"69⤵
- Suspicious use of SetThreadContext
PID:1488 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"70⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3168 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"71⤵
- Suspicious use of SetThreadContext
PID:4588 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"72⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:372 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"73⤵
- Suspicious use of SetThreadContext
PID:4036 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"74⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2892 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"75⤵
- Suspicious use of SetThreadContext
PID:4284 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"76⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3136 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"77⤵
- Suspicious use of SetThreadContext
PID:3128 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"78⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5104 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"79⤵
- Suspicious use of SetThreadContext
PID:1560 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"80⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2276 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"81⤵
- Suspicious use of SetThreadContext
PID:456 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"82⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3016 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"83⤵
- Suspicious use of SetThreadContext
PID:4760 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"84⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4504 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"85⤵
- Suspicious use of SetThreadContext
PID:3624 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"86⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4484 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"87⤵
- Suspicious use of SetThreadContext
PID:2952 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"88⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3540 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"89⤵
- Suspicious use of SetThreadContext
PID:4064 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"90⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4656 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"91⤵
- Suspicious use of SetThreadContext
PID:3884 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"92⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1844 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"93⤵
- Suspicious use of SetThreadContext
PID:3752 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"94⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2716 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"95⤵
- Suspicious use of SetThreadContext
PID:2964 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"96⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4552 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"97⤵
- Suspicious use of SetThreadContext
PID:776 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"98⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4792 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"99⤵
- Suspicious use of SetThreadContext
PID:1856 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"100⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4440 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"101⤵
- Suspicious use of SetThreadContext
PID:5016 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"102⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3428 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"103⤵
- Suspicious use of SetThreadContext
PID:1916 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"104⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4812 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"105⤵
- Suspicious use of SetThreadContext
PID:1500 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"106⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2808 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"107⤵
- Suspicious use of SetThreadContext
PID:4736 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"108⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1904 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"109⤵
- Suspicious use of SetThreadContext
PID:4456 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"110⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"111⤵
- Suspicious use of SetThreadContext
PID:4052 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"112⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4684 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"113⤵
- Suspicious use of SetThreadContext
PID:3248 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"114⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5016 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"115⤵
- Suspicious use of SetThreadContext
PID:2404 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"116⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3492 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"117⤵
- Suspicious use of SetThreadContext
PID:1052 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"118⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1936 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"119⤵
- Suspicious use of SetThreadContext
PID:1072 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"120⤵
- Disables RegEdit via registry modification
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\system32\symlsrvn.exe"121⤵
- Suspicious use of SetThreadContext
PID:2488 -
C:\Windows\SysWOW64\symlsrvn.exe"C:\Windows\SysWOW64\symlsrvn.exe"122⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1084
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-