Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
19-07-2024 19:28
Behavioral task
behavioral1
Sample
5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe
Resource
win7-20240704-en
windows7-x64
8 signatures
150 seconds
Behavioral task
behavioral2
Sample
5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe
Resource
win10v2004-20240709-en
windows10-2004-x64
7 signatures
150 seconds
General
-
Target
5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe
-
Size
73KB
-
MD5
5d56d8d8600cdbfadaa1b66469b7a646
-
SHA1
9369717a8dbc49452f5e1ea27a92e4eb779dbd6a
-
SHA256
4171de49be68064ee63937bdd560c253c9b5173c0497bc7835ec497f6d3e87e0
-
SHA512
296409e15338863a0c1022022ff7eb5f5bf00ea7907cb7ce37701e183ad089b751911831bb908e4f2a148637735d17b2aa9951aba38bf80bd37c3e58a4c0ef5b
-
SSDEEP
1536:SvVLAUfOWlydRdBhfuDolgEHVzHpjOTtOTWOT2iX:2BJf5K1flWM4QvKiX
Score
10/10
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\mesg.com" mesg.com -
resource yara_rule behavioral1/files/0x00080000000174a8-11.dat aspack_v212_v242 behavioral1/files/0x00080000000173de-16.dat aspack_v212_v242 -
Executes dropped EXE 64 IoCs
pid Process 2840 mesg.com 2928 mesg.com 2632 mesg.com 2620 mesg.com 1940 mesg.com 1312 mesg.com 2988 mesg.com 2108 mesg.com 1604 mesg.com 1476 mesg.com 1524 mesg.com 1000 mesg.com 2876 mesg.com 1980 mesg.com 112 mesg.com 2212 mesg.com 1804 mesg.com 2524 mesg.com 3020 mesg.com 2456 mesg.com 1284 mesg.com 2376 mesg.com 2232 mesg.com 1352 mesg.com 2884 mesg.com 904 mesg.com 1968 mesg.com 288 mesg.com 2564 mesg.com 2388 mesg.com 3056 mesg.com 2560 mesg.com 468 mesg.com 1828 mesg.com 2936 mesg.com 2056 mesg.com 2732 mesg.com 2452 mesg.com 2904 mesg.com 1280 mesg.com 2640 mesg.com 2836 mesg.com 2648 mesg.com 2616 mesg.com 2252 mesg.com 2112 mesg.com 2036 mesg.com 2944 mesg.com 2568 mesg.com 2992 mesg.com 2188 mesg.com 1912 mesg.com 1300 mesg.com 1612 mesg.com 316 mesg.com 1708 mesg.com 2816 mesg.com 2880 mesg.com 632 mesg.com 1000 mesg.com 332 mesg.com 2200 mesg.com 2540 mesg.com 2172 mesg.com -
Loads dropped DLL 64 IoCs
pid Process 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 2840 mesg.com 2840 mesg.com 2928 mesg.com 2928 mesg.com 2632 mesg.com 2632 mesg.com 2620 mesg.com 2620 mesg.com 1940 mesg.com 1940 mesg.com 1312 mesg.com 1312 mesg.com 2988 mesg.com 2988 mesg.com 2108 mesg.com 2108 mesg.com 1604 mesg.com 1604 mesg.com 1476 mesg.com 1476 mesg.com 1524 mesg.com 1524 mesg.com 1000 mesg.com 1000 mesg.com 2876 mesg.com 2876 mesg.com 1980 mesg.com 1980 mesg.com 112 mesg.com 112 mesg.com 2212 mesg.com 2212 mesg.com 1804 mesg.com 1804 mesg.com 2524 mesg.com 2524 mesg.com 3020 mesg.com 3020 mesg.com 2456 mesg.com 2456 mesg.com 1284 mesg.com 1284 mesg.com 2376 mesg.com 2376 mesg.com 2232 mesg.com 2232 mesg.com 1352 mesg.com 1352 mesg.com 2884 mesg.com 2884 mesg.com 904 mesg.com 904 mesg.com 1968 mesg.com 1968 mesg.com 288 mesg.com 288 mesg.com 2564 mesg.com 2564 mesg.com 2388 mesg.com 2388 mesg.com 3056 mesg.com 3056 mesg.com -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com File created C:\Windows\SysWOW64\mesg.com mesg.com File opened for modification C:\Windows\SysWOW64\mesg.exe mesg.com -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com File opened for modification C:\Windows\get.exe mesg.com -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 2840 mesg.com 2928 mesg.com 2632 mesg.com 2620 mesg.com 1940 mesg.com 1312 mesg.com 2988 mesg.com 2108 mesg.com 1604 mesg.com 1476 mesg.com 1524 mesg.com 1000 mesg.com 2876 mesg.com 1980 mesg.com 112 mesg.com 2212 mesg.com 1804 mesg.com 2524 mesg.com 3020 mesg.com 2456 mesg.com 1284 mesg.com 2376 mesg.com 2232 mesg.com 1352 mesg.com 2884 mesg.com 904 mesg.com 1968 mesg.com 288 mesg.com 2564 mesg.com 2388 mesg.com 3056 mesg.com 2560 mesg.com 468 mesg.com 1828 mesg.com 2936 mesg.com 2056 mesg.com 2732 mesg.com 2452 mesg.com 2904 mesg.com 1280 mesg.com 2640 mesg.com 2836 mesg.com 2648 mesg.com 2616 mesg.com 2252 mesg.com 2112 mesg.com 2036 mesg.com 2944 mesg.com 2568 mesg.com 2992 mesg.com 2188 mesg.com 1912 mesg.com 1300 mesg.com 1612 mesg.com 316 mesg.com 1708 mesg.com 2816 mesg.com 2880 mesg.com 632 mesg.com 1000 mesg.com 332 mesg.com 2200 mesg.com 2540 mesg.com -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1280 wrote to memory of 2840 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2840 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2840 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 31 PID 1280 wrote to memory of 2840 1280 5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe 31 PID 2840 wrote to memory of 2928 2840 mesg.com 32 PID 2840 wrote to memory of 2928 2840 mesg.com 32 PID 2840 wrote to memory of 2928 2840 mesg.com 32 PID 2840 wrote to memory of 2928 2840 mesg.com 32 PID 2928 wrote to memory of 2632 2928 mesg.com 33 PID 2928 wrote to memory of 2632 2928 mesg.com 33 PID 2928 wrote to memory of 2632 2928 mesg.com 33 PID 2928 wrote to memory of 2632 2928 mesg.com 33 PID 2632 wrote to memory of 2620 2632 mesg.com 34 PID 2632 wrote to memory of 2620 2632 mesg.com 34 PID 2632 wrote to memory of 2620 2632 mesg.com 34 PID 2632 wrote to memory of 2620 2632 mesg.com 34 PID 2620 wrote to memory of 1940 2620 mesg.com 35 PID 2620 wrote to memory of 1940 2620 mesg.com 35 PID 2620 wrote to memory of 1940 2620 mesg.com 35 PID 2620 wrote to memory of 1940 2620 mesg.com 35 PID 1940 wrote to memory of 1312 1940 mesg.com 36 PID 1940 wrote to memory of 1312 1940 mesg.com 36 PID 1940 wrote to memory of 1312 1940 mesg.com 36 PID 1940 wrote to memory of 1312 1940 mesg.com 36 PID 1312 wrote to memory of 2988 1312 mesg.com 37 PID 1312 wrote to memory of 2988 1312 mesg.com 37 PID 1312 wrote to memory of 2988 1312 mesg.com 37 PID 1312 wrote to memory of 2988 1312 mesg.com 37 PID 2988 wrote to memory of 2108 2988 mesg.com 38 PID 2988 wrote to memory of 2108 2988 mesg.com 38 PID 2988 wrote to memory of 2108 2988 mesg.com 38 PID 2988 wrote to memory of 2108 2988 mesg.com 38 PID 2108 wrote to memory of 1604 2108 mesg.com 39 PID 2108 wrote to memory of 1604 2108 mesg.com 39 PID 2108 wrote to memory of 1604 2108 mesg.com 39 PID 2108 wrote to memory of 1604 2108 mesg.com 39 PID 1604 wrote to memory of 1476 1604 mesg.com 40 PID 1604 wrote to memory of 1476 1604 mesg.com 40 PID 1604 wrote to memory of 1476 1604 mesg.com 40 PID 1604 wrote to memory of 1476 1604 mesg.com 40 PID 1476 wrote to memory of 1524 1476 mesg.com 41 PID 1476 wrote to memory of 1524 1476 mesg.com 41 PID 1476 wrote to memory of 1524 1476 mesg.com 41 PID 1476 wrote to memory of 1524 1476 mesg.com 41 PID 1524 wrote to memory of 1000 1524 mesg.com 42 PID 1524 wrote to memory of 1000 1524 mesg.com 42 PID 1524 wrote to memory of 1000 1524 mesg.com 42 PID 1524 wrote to memory of 1000 1524 mesg.com 42 PID 1000 wrote to memory of 2876 1000 mesg.com 43 PID 1000 wrote to memory of 2876 1000 mesg.com 43 PID 1000 wrote to memory of 2876 1000 mesg.com 43 PID 1000 wrote to memory of 2876 1000 mesg.com 43 PID 2876 wrote to memory of 1980 2876 mesg.com 44 PID 2876 wrote to memory of 1980 2876 mesg.com 44 PID 2876 wrote to memory of 1980 2876 mesg.com 44 PID 2876 wrote to memory of 1980 2876 mesg.com 44 PID 1980 wrote to memory of 112 1980 mesg.com 45 PID 1980 wrote to memory of 112 1980 mesg.com 45 PID 1980 wrote to memory of 112 1980 mesg.com 45 PID 1980 wrote to memory of 112 1980 mesg.com 45 PID 112 wrote to memory of 2212 112 mesg.com 46 PID 112 wrote to memory of 2212 112 mesg.com 46 PID 112 wrote to memory of 2212 112 mesg.com 46 PID 112 wrote to memory of 2212 112 mesg.com 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\5d56d8d8600cdbfadaa1b66469b7a646_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com7⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com8⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com10⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1000 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:112 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com17⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com19⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com20⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1284 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com26⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com27⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com28⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:288 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2564 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com31⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com32⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com33⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:468 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com35⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com37⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2056 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1280 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com43⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com44⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com45⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com46⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com48⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com50⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com51⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com52⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com54⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com55⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com56⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:316 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com57⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:1708 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com58⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com59⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com60⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:632 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com61⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com62⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:332 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com63⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com64⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com65⤵
- Executes dropped EXE
PID:2172 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com66⤵PID:112
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com67⤵PID:2212
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com68⤵
- Modifies WinLogon for persistence
PID:2512 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com69⤵
- Modifies WinLogon for persistence
PID:1592 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com70⤵
- Drops file in Windows directory
PID:1240 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com71⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
PID:2304 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com72⤵PID:408
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com73⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com74⤵PID:2556
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com75⤵
- Drops file in System32 directory
PID:896 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com76⤵
- Modifies WinLogon for persistence
PID:1816 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com77⤵PID:1776
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com78⤵
- Drops file in System32 directory
PID:2528 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com79⤵
- Modifies WinLogon for persistence
PID:1144 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com80⤵
- Drops file in Windows directory
PID:692 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com81⤵
- Modifies WinLogon for persistence
PID:2004 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com82⤵
- Drops file in System32 directory
PID:2508 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com83⤵PID:2404
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com84⤵PID:984
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com85⤵
- Modifies WinLogon for persistence
- Drops file in System32 directory
- Drops file in Windows directory
PID:268 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com86⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
PID:1688 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com87⤵
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com88⤵PID:1600
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com89⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:1576 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com90⤵PID:2900
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com91⤵PID:2756
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com92⤵PID:2460
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com93⤵PID:2932
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com94⤵PID:2908
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com95⤵
- Drops file in System32 directory
PID:2024 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com96⤵PID:2668
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com97⤵PID:2632
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com98⤵
- Drops file in Windows directory
PID:2196 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com99⤵PID:2252
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com100⤵PID:2780
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com101⤵
- Modifies WinLogon for persistence
PID:2036 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com102⤵
- Modifies WinLogon for persistence
PID:2704 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com103⤵
- Drops file in System32 directory
PID:1148 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com104⤵
- Modifies WinLogon for persistence
PID:2848 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com105⤵
- Drops file in Windows directory
PID:2656 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com106⤵
- Drops file in Windows directory
PID:2108 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com107⤵PID:376
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com108⤵
- Modifies WinLogon for persistence
PID:980 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com109⤵PID:2040
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com110⤵PID:2672
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com111⤵
- Modifies WinLogon for persistence
PID:1364 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com112⤵
- Drops file in Windows directory
PID:1768 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com113⤵PID:2204
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com114⤵PID:344
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com115⤵PID:668
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com116⤵
- Drops file in Windows directory
PID:1980 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com117⤵PID:1092
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com118⤵PID:2152
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com119⤵
- Drops file in System32 directory
PID:2312 -
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com120⤵PID:1956
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com121⤵PID:2212
-
C:\Windows\SysWOW64\mesg.comC:\Windows\system32\mesg.com122⤵
- Drops file in Windows directory
PID:2512
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-