Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
95s -
max time network
129s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:35
Behavioral task
behavioral1
Sample
69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe
Resource
win10v2004-20240704-en
General
-
Target
69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe
-
Size
172KB
-
MD5
69f0067aca1dfc97b3b8beabab998ad9
-
SHA1
d0d5ea8b2b7033c80017ca5b0cd6018d8f837873
-
SHA256
3f8681da6b6677333cefcc87bd7850d05e34eb4f9e287762b7a4e1349053fb1c
-
SHA512
e01db396040fd4515b4bf8f34afd1540ce6610a8abbf89141a74e5f216a538cf6e73992765c2a146dbe362a8eb3b4ae2b2ee94f705bfd91f1ee15f06a16ba7e0
-
SSDEEP
3072:f3MVwf8KoutpKYyI/rbCEBTqshbd9cmVQLVJ8lrASMZR5iFWMt/pf:f3MVu8KoSpKYx/Lh/0HLyJp
Malware Config
Signatures
-
Blocklisted process makes network request 1 IoCs
flow pid Process 43 2512 Process not Found -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe Key value queried \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000\Control Panel\International\Geo\Nation systcontrl.exe -
Executes dropped EXE 64 IoCs
pid Process 3020 systcontrl.exe 2140 systcontrl.exe 2356 systcontrl.exe 2452 systcontrl.exe 4680 systcontrl.exe 2912 systcontrl.exe 5016 systcontrl.exe 412 systcontrl.exe 3484 systcontrl.exe 4560 systcontrl.exe 4212 systcontrl.exe 2060 systcontrl.exe 1328 systcontrl.exe 220 systcontrl.exe 4956 systcontrl.exe 856 systcontrl.exe 1464 systcontrl.exe 3224 systcontrl.exe 3868 systcontrl.exe 1436 systcontrl.exe 5088 systcontrl.exe 4164 systcontrl.exe 3496 systcontrl.exe 3172 systcontrl.exe 4532 systcontrl.exe 512 systcontrl.exe 376 systcontrl.exe 3192 systcontrl.exe 5028 systcontrl.exe 1952 systcontrl.exe 2844 systcontrl.exe 4476 systcontrl.exe 4736 systcontrl.exe 1020 systcontrl.exe 852 systcontrl.exe 228 systcontrl.exe 3752 systcontrl.exe 3556 systcontrl.exe 380 systcontrl.exe 376 systcontrl.exe 3192 systcontrl.exe 5028 systcontrl.exe 1952 systcontrl.exe 3468 systcontrl.exe 2900 systcontrl.exe 4664 systcontrl.exe 2636 systcontrl.exe 852 systcontrl.exe 4252 systcontrl.exe 948 systcontrl.exe 4540 systcontrl.exe 380 systcontrl.exe 2004 systcontrl.exe 4124 systcontrl.exe 3224 systcontrl.exe 4448 systcontrl.exe 4276 systcontrl.exe 860 systcontrl.exe 2936 systcontrl.exe 1700 systcontrl.exe 4140 systcontrl.exe 412 systcontrl.exe 1752 systcontrl.exe 4716 systcontrl.exe -
resource yara_rule behavioral2/memory/3636-0-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/files/0x000800000002325a-5.dat upx behavioral2/memory/3020-34-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/memory/852-71-0x0000000000400000-0x000000000042C000-memory.dmp upx behavioral2/memory/3464-73-0x0000000000400000-0x000000000042C000-memory.dmp upx -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows System-Control Drivers = "systcontrl.exe" systcontrl.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File created C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe File opened for modification C:\Windows\SysWOW64\systcontrl.exe systcontrl.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systcontrl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ systcontrl.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 3020 systcontrl.exe Token: SeIncBasePriorityPrivilege 2140 systcontrl.exe Token: SeIncBasePriorityPrivilege 2356 systcontrl.exe Token: SeIncBasePriorityPrivilege 2452 systcontrl.exe Token: SeIncBasePriorityPrivilege 4680 systcontrl.exe Token: SeIncBasePriorityPrivilege 2912 systcontrl.exe Token: SeIncBasePriorityPrivilege 5016 systcontrl.exe Token: SeIncBasePriorityPrivilege 412 systcontrl.exe Token: SeIncBasePriorityPrivilege 3484 systcontrl.exe Token: SeIncBasePriorityPrivilege 4560 systcontrl.exe Token: SeIncBasePriorityPrivilege 4212 systcontrl.exe Token: SeIncBasePriorityPrivilege 2060 systcontrl.exe Token: SeIncBasePriorityPrivilege 1328 systcontrl.exe Token: SeIncBasePriorityPrivilege 220 systcontrl.exe Token: SeIncBasePriorityPrivilege 4956 systcontrl.exe Token: SeIncBasePriorityPrivilege 856 systcontrl.exe Token: SeIncBasePriorityPrivilege 1464 systcontrl.exe Token: SeIncBasePriorityPrivilege 3224 systcontrl.exe Token: SeIncBasePriorityPrivilege 3868 systcontrl.exe Token: SeIncBasePriorityPrivilege 1436 systcontrl.exe Token: SeIncBasePriorityPrivilege 5088 systcontrl.exe Token: SeIncBasePriorityPrivilege 4164 systcontrl.exe Token: SeIncBasePriorityPrivilege 3496 systcontrl.exe Token: SeIncBasePriorityPrivilege 3172 systcontrl.exe Token: SeIncBasePriorityPrivilege 4532 systcontrl.exe Token: SeIncBasePriorityPrivilege 512 systcontrl.exe Token: SeIncBasePriorityPrivilege 376 systcontrl.exe Token: SeIncBasePriorityPrivilege 3192 systcontrl.exe Token: SeIncBasePriorityPrivilege 5028 systcontrl.exe Token: SeIncBasePriorityPrivilege 1952 systcontrl.exe Token: SeIncBasePriorityPrivilege 2844 systcontrl.exe Token: SeIncBasePriorityPrivilege 4476 systcontrl.exe Token: SeIncBasePriorityPrivilege 4736 systcontrl.exe Token: SeIncBasePriorityPrivilege 1020 systcontrl.exe Token: SeIncBasePriorityPrivilege 852 systcontrl.exe Token: SeIncBasePriorityPrivilege 228 systcontrl.exe Token: SeIncBasePriorityPrivilege 3752 systcontrl.exe Token: SeIncBasePriorityPrivilege 3556 systcontrl.exe Token: SeIncBasePriorityPrivilege 380 systcontrl.exe Token: SeIncBasePriorityPrivilege 376 systcontrl.exe Token: SeIncBasePriorityPrivilege 3192 systcontrl.exe Token: SeIncBasePriorityPrivilege 5028 systcontrl.exe Token: SeIncBasePriorityPrivilege 1952 systcontrl.exe Token: SeIncBasePriorityPrivilege 3468 systcontrl.exe Token: SeIncBasePriorityPrivilege 2900 systcontrl.exe Token: SeIncBasePriorityPrivilege 4664 systcontrl.exe Token: SeIncBasePriorityPrivilege 2636 systcontrl.exe Token: SeIncBasePriorityPrivilege 852 systcontrl.exe Token: SeIncBasePriorityPrivilege 4252 systcontrl.exe Token: SeIncBasePriorityPrivilege 948 systcontrl.exe Token: SeIncBasePriorityPrivilege 4540 systcontrl.exe Token: SeIncBasePriorityPrivilege 380 systcontrl.exe Token: SeIncBasePriorityPrivilege 2004 systcontrl.exe Token: SeIncBasePriorityPrivilege 4124 systcontrl.exe Token: SeIncBasePriorityPrivilege 3224 systcontrl.exe Token: SeIncBasePriorityPrivilege 4448 systcontrl.exe Token: SeIncBasePriorityPrivilege 4276 systcontrl.exe Token: SeIncBasePriorityPrivilege 860 systcontrl.exe Token: SeIncBasePriorityPrivilege 2936 systcontrl.exe Token: SeIncBasePriorityPrivilege 1700 systcontrl.exe Token: SeIncBasePriorityPrivilege 4140 systcontrl.exe Token: SeIncBasePriorityPrivilege 412 systcontrl.exe Token: SeIncBasePriorityPrivilege 1752 systcontrl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3636 wrote to memory of 3020 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe 86 PID 3636 wrote to memory of 3020 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe 86 PID 3636 wrote to memory of 3020 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe 86 PID 3636 wrote to memory of 220 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe 87 PID 3636 wrote to memory of 220 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe 87 PID 3636 wrote to memory of 220 3636 69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe 87 PID 3020 wrote to memory of 2140 3020 systcontrl.exe 91 PID 3020 wrote to memory of 2140 3020 systcontrl.exe 91 PID 3020 wrote to memory of 2140 3020 systcontrl.exe 91 PID 3020 wrote to memory of 3384 3020 systcontrl.exe 92 PID 3020 wrote to memory of 3384 3020 systcontrl.exe 92 PID 3020 wrote to memory of 3384 3020 systcontrl.exe 92 PID 2140 wrote to memory of 2356 2140 systcontrl.exe 94 PID 2140 wrote to memory of 2356 2140 systcontrl.exe 94 PID 2140 wrote to memory of 2356 2140 systcontrl.exe 94 PID 2140 wrote to memory of 4056 2140 systcontrl.exe 95 PID 2140 wrote to memory of 4056 2140 systcontrl.exe 95 PID 2140 wrote to memory of 4056 2140 systcontrl.exe 95 PID 2356 wrote to memory of 2452 2356 systcontrl.exe 97 PID 2356 wrote to memory of 2452 2356 systcontrl.exe 97 PID 2356 wrote to memory of 2452 2356 systcontrl.exe 97 PID 2356 wrote to memory of 4324 2356 systcontrl.exe 98 PID 2356 wrote to memory of 4324 2356 systcontrl.exe 98 PID 2356 wrote to memory of 4324 2356 systcontrl.exe 98 PID 2452 wrote to memory of 4680 2452 systcontrl.exe 100 PID 2452 wrote to memory of 4680 2452 systcontrl.exe 100 PID 2452 wrote to memory of 4680 2452 systcontrl.exe 100 PID 2452 wrote to memory of 988 2452 systcontrl.exe 101 PID 2452 wrote to memory of 988 2452 systcontrl.exe 101 PID 2452 wrote to memory of 988 2452 systcontrl.exe 101 PID 4680 wrote to memory of 2912 4680 systcontrl.exe 102 PID 4680 wrote to memory of 2912 4680 systcontrl.exe 102 PID 4680 wrote to memory of 2912 4680 systcontrl.exe 102 PID 4680 wrote to memory of 1568 4680 systcontrl.exe 103 PID 4680 wrote to memory of 1568 4680 systcontrl.exe 103 PID 4680 wrote to memory of 1568 4680 systcontrl.exe 103 PID 2912 wrote to memory of 5016 2912 systcontrl.exe 106 PID 2912 wrote to memory of 5016 2912 systcontrl.exe 106 PID 2912 wrote to memory of 5016 2912 systcontrl.exe 106 PID 2912 wrote to memory of 1540 2912 systcontrl.exe 107 PID 2912 wrote to memory of 1540 2912 systcontrl.exe 107 PID 2912 wrote to memory of 1540 2912 systcontrl.exe 107 PID 5016 wrote to memory of 412 5016 systcontrl.exe 109 PID 5016 wrote to memory of 412 5016 systcontrl.exe 109 PID 5016 wrote to memory of 412 5016 systcontrl.exe 109 PID 5016 wrote to memory of 2764 5016 systcontrl.exe 110 PID 5016 wrote to memory of 2764 5016 systcontrl.exe 110 PID 5016 wrote to memory of 2764 5016 systcontrl.exe 110 PID 412 wrote to memory of 3484 412 systcontrl.exe 112 PID 412 wrote to memory of 3484 412 systcontrl.exe 112 PID 412 wrote to memory of 3484 412 systcontrl.exe 112 PID 412 wrote to memory of 1804 412 systcontrl.exe 113 PID 412 wrote to memory of 1804 412 systcontrl.exe 113 PID 412 wrote to memory of 1804 412 systcontrl.exe 113 PID 3484 wrote to memory of 4560 3484 systcontrl.exe 115 PID 3484 wrote to memory of 4560 3484 systcontrl.exe 115 PID 3484 wrote to memory of 4560 3484 systcontrl.exe 115 PID 3484 wrote to memory of 3172 3484 systcontrl.exe 161 PID 3484 wrote to memory of 3172 3484 systcontrl.exe 161 PID 3484 wrote to memory of 3172 3484 systcontrl.exe 161 PID 4560 wrote to memory of 4212 4560 systcontrl.exe 118 PID 4560 wrote to memory of 4212 4560 systcontrl.exe 118 PID 4560 wrote to memory of 4212 4560 systcontrl.exe 118 PID 4560 wrote to memory of 4528 4560 systcontrl.exe 119
Processes
-
C:\Users\Admin\AppData\Local\Temp\69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\69f0067aca1dfc97b3b8beabab998ad9_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"2⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"5⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"6⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5016 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"9⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:412 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"11⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4212 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1328 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:220 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4956 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"17⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:856 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"18⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1464 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3224 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3868 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"21⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1436 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5088 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4164 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"24⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3496 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"25⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3172 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:512 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"29⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"30⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2844 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4476 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"34⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4736 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"35⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1020 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:228 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3556 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:376 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1952 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3468 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2900 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"47⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4664 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"49⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:852 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"50⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4252 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:948 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4540 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:380 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"54⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2004 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"56⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3224 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4448 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4276 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:860 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2936 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"61⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4140 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"64⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1752 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"65⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"66⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4156 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"67⤵
- Drops file in System32 directory
PID:1232 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"68⤵
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"69⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4696 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"70⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3972 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"71⤵
- Drops file in System32 directory
PID:1540 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"72⤵
- Adds Run key to start application
PID:3468 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"74⤵
- Adds Run key to start application
PID:5056 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"75⤵
- Drops file in System32 directory
- Modifies registry class
PID:3104 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"76⤵
- Modifies registry class
PID:3412 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"77⤵PID:2308
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"78⤵
- Checks computer location settings
- Modifies registry class
PID:4324 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"79⤵
- Adds Run key to start application
PID:3508 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"80⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4540 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"81⤵PID:1092
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"82⤵PID:2896
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"83⤵PID:3844
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"84⤵PID:3660
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"85⤵PID:3500
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"86⤵
- Checks computer location settings
PID:4328 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"87⤵PID:4836
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"88⤵PID:4000
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"89⤵
- Drops file in System32 directory
- Modifies registry class
PID:2936 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"90⤵
- Modifies registry class
PID:1700 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"91⤵
- Modifies registry class
PID:3364 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"92⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:412 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"93⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"94⤵
- Modifies registry class
PID:4748 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"95⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3020 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"96⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:332 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"97⤵
- Checks computer location settings
PID:4132 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"98⤵
- Checks computer location settings
- Modifies registry class
PID:3984 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"99⤵PID:3660
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"100⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4080 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"101⤵
- Drops file in System32 directory
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"102⤵PID:2888
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"103⤵
- Adds Run key to start application
PID:828 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"104⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3796 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"105⤵PID:4628
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"106⤵PID:1860
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"107⤵
- Checks computer location settings
PID:4504 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1812 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"109⤵
- Drops file in System32 directory
PID:3520 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"110⤵PID:4956
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"111⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4088 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"112⤵PID:3984
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"113⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4404 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"114⤵
- Drops file in System32 directory
PID:4080 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"115⤵
- Checks computer location settings
- Adds Run key to start application
PID:3356 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"116⤵
- Checks computer location settings
PID:2956 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"117⤵
- System Location Discovery: System Language Discovery
PID:828 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"118⤵
- Adds Run key to start application
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"119⤵PID:3608
-
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"120⤵
- Drops file in System32 directory
PID:3364 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"121⤵
- Adds Run key to start application
- Modifies registry class
PID:4156 -
C:\Windows\SysWOW64\systcontrl.exe"C:\Windows\system32\systcontrl.exe"122⤵
- Checks computer location settings
PID:4484
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-