Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 10:14
Static task
static1
Behavioral task
behavioral1
Sample
89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe
-
Size
1021KB
-
MD5
89fb5c184b3df2af2d1e739f812ac8de
-
SHA1
9c010113de08370e551b3b5a92297590de4e645f
-
SHA256
f33244fb4cc6606ab0ec6266b03e341da9dc446366d66403f598902b27a3eceb
-
SHA512
ddeddb5063f8ad7aad6126243b1c7551f6998db484089e809c49d88a49d027f7cbb33ce7207073bcf91d4a5ae683ae5524095aae9d87e83eafbcb2f70d18cc24
-
SSDEEP
12288:19jx4mIRzJEvfrMxCBzvW4APEg6iyGnB1CSKhx0ZW4tYrZaG6IRNbVqRSK1jnnry:17aeYC7nfGn+SmoK1ae3bVqRlnry
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 216 iplog.exe 5020 iplog.exe 4920 iplog.exe 4548 iplog.exe 1080 iplog.exe 4704 iplog.exe 1676 iplog.exe 2176 iplog.exe 5008 iplog.exe 3988 iplog.exe 1224 iplog.exe 4260 iplog.exe 64 iplog.exe 1668 iplog.exe 3948 iplog.exe 1252 iplog.exe 1132 iplog.exe 2524 iplog.exe 1144 iplog.exe 1512 iplog.exe 1244 iplog.exe 1996 iplog.exe 2976 iplog.exe 1076 iplog.exe 2052 iplog.exe 2480 iplog.exe 640 iplog.exe 1080 iplog.exe 2936 iplog.exe 2880 iplog.exe 2552 iplog.exe 3536 iplog.exe 60 iplog.exe 1220 iplog.exe 1484 iplog.exe 4884 iplog.exe 4388 iplog.exe 2212 iplog.exe 2980 iplog.exe 2604 iplog.exe 2788 iplog.exe 1520 iplog.exe 1120 iplog.exe 2948 iplog.exe 1344 iplog.exe 756 iplog.exe 2032 iplog.exe 1688 iplog.exe 116 iplog.exe 1028 iplog.exe 4172 iplog.exe 4456 iplog.exe 4660 iplog.exe 4048 iplog.exe 3424 iplog.exe 4360 iplog.exe 3412 iplog.exe 1556 iplog.exe 1208 iplog.exe 1488 iplog.exe 4264 iplog.exe 1220 iplog.exe 5036 iplog.exe 3748 iplog.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\iplog.exe iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\logkey.ini iplog.exe File opened for modification C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe File created C:\Windows\SysWOW64\ipsnow.exe iplog.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe File opened for modification C:\Windows\sk.exe iplog.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iplog.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3376 wrote to memory of 216 3376 89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe 87 PID 3376 wrote to memory of 216 3376 89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe 87 PID 3376 wrote to memory of 216 3376 89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe 87 PID 216 wrote to memory of 5020 216 iplog.exe 88 PID 216 wrote to memory of 5020 216 iplog.exe 88 PID 216 wrote to memory of 5020 216 iplog.exe 88 PID 5020 wrote to memory of 4920 5020 iplog.exe 91 PID 5020 wrote to memory of 4920 5020 iplog.exe 91 PID 5020 wrote to memory of 4920 5020 iplog.exe 91 PID 4920 wrote to memory of 4548 4920 iplog.exe 94 PID 4920 wrote to memory of 4548 4920 iplog.exe 94 PID 4920 wrote to memory of 4548 4920 iplog.exe 94 PID 4548 wrote to memory of 1080 4548 iplog.exe 95 PID 4548 wrote to memory of 1080 4548 iplog.exe 95 PID 4548 wrote to memory of 1080 4548 iplog.exe 95 PID 1080 wrote to memory of 4704 1080 iplog.exe 97 PID 1080 wrote to memory of 4704 1080 iplog.exe 97 PID 1080 wrote to memory of 4704 1080 iplog.exe 97 PID 4704 wrote to memory of 1676 4704 iplog.exe 98 PID 4704 wrote to memory of 1676 4704 iplog.exe 98 PID 4704 wrote to memory of 1676 4704 iplog.exe 98 PID 1676 wrote to memory of 2176 1676 iplog.exe 100 PID 1676 wrote to memory of 2176 1676 iplog.exe 100 PID 1676 wrote to memory of 2176 1676 iplog.exe 100 PID 2176 wrote to memory of 5008 2176 iplog.exe 101 PID 2176 wrote to memory of 5008 2176 iplog.exe 101 PID 2176 wrote to memory of 5008 2176 iplog.exe 101 PID 5008 wrote to memory of 3988 5008 iplog.exe 103 PID 5008 wrote to memory of 3988 5008 iplog.exe 103 PID 5008 wrote to memory of 3988 5008 iplog.exe 103 PID 3988 wrote to memory of 1224 3988 iplog.exe 104 PID 3988 wrote to memory of 1224 3988 iplog.exe 104 PID 3988 wrote to memory of 1224 3988 iplog.exe 104 PID 1224 wrote to memory of 4260 1224 iplog.exe 105 PID 1224 wrote to memory of 4260 1224 iplog.exe 105 PID 1224 wrote to memory of 4260 1224 iplog.exe 105 PID 4260 wrote to memory of 64 4260 iplog.exe 106 PID 4260 wrote to memory of 64 4260 iplog.exe 106 PID 4260 wrote to memory of 64 4260 iplog.exe 106 PID 64 wrote to memory of 1668 64 iplog.exe 107 PID 64 wrote to memory of 1668 64 iplog.exe 107 PID 64 wrote to memory of 1668 64 iplog.exe 107 PID 1668 wrote to memory of 3948 1668 iplog.exe 108 PID 1668 wrote to memory of 3948 1668 iplog.exe 108 PID 1668 wrote to memory of 3948 1668 iplog.exe 108 PID 3948 wrote to memory of 1252 3948 iplog.exe 109 PID 3948 wrote to memory of 1252 3948 iplog.exe 109 PID 3948 wrote to memory of 1252 3948 iplog.exe 109 PID 1252 wrote to memory of 1132 1252 iplog.exe 110 PID 1252 wrote to memory of 1132 1252 iplog.exe 110 PID 1252 wrote to memory of 1132 1252 iplog.exe 110 PID 1132 wrote to memory of 2524 1132 iplog.exe 111 PID 1132 wrote to memory of 2524 1132 iplog.exe 111 PID 1132 wrote to memory of 2524 1132 iplog.exe 111 PID 2524 wrote to memory of 1144 2524 iplog.exe 113 PID 2524 wrote to memory of 1144 2524 iplog.exe 113 PID 2524 wrote to memory of 1144 2524 iplog.exe 113 PID 1144 wrote to memory of 1512 1144 iplog.exe 114 PID 1144 wrote to memory of 1512 1144 iplog.exe 114 PID 1144 wrote to memory of 1512 1144 iplog.exe 114 PID 1512 wrote to memory of 1244 1512 iplog.exe 117 PID 1512 wrote to memory of 1244 1512 iplog.exe 117 PID 1512 wrote to memory of 1244 1512 iplog.exe 117 PID 1244 wrote to memory of 1996 1244 iplog.exe 118
Processes
-
C:\Users\Admin\AppData\Local\Temp\89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\89fb5c184b3df2af2d1e739f812ac8de_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3376 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5020 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe7⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe12⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:64 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe18⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1132 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe19⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2524 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1144 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe21⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe23⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe24⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2052 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2480 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe28⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:640 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe29⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe30⤵
- Executes dropped EXE
PID:2936 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe31⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2552 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3536 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe36⤵
- Executes dropped EXE
PID:1484 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4884 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4388 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe39⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2212 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe40⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2980 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe41⤵
- Executes dropped EXE
PID:2604 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1520 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe44⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:1120 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
PID:2948 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1344 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe47⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:756 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2032 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1688 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe50⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1028 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4172 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe53⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4456 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe55⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe56⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe57⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe58⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3412 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1556 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe60⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1208 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe61⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe62⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4264 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe64⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3748 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe66⤵
- System Location Discovery: System Language Discovery
PID:2348 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe67⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4784 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe68⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe69⤵
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe71⤵
- Drops file in Windows directory
PID:2668 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe72⤵
- System Location Discovery: System Language Discovery
PID:2560 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe73⤵
- Drops file in Windows directory
PID:4576 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe74⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4172 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe75⤵PID:4980
-
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe76⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4356 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe77⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4048 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe78⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3424 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe79⤵
- Drops file in Windows directory
PID:4232 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe80⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1612 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe81⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:968 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe82⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe83⤵
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe84⤵
- Drops file in System32 directory
PID:5100 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe85⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2552 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe87⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:5012 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe88⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2536 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe89⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe90⤵
- Drops file in System32 directory
PID:3380 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe91⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe92⤵
- System Location Discovery: System Language Discovery
PID:3720 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe93⤵
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe94⤵
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\iplog.exeC:\Windows\system32\iplog.exe95⤵
- System Location Discovery: System Language Discovery
PID:4876
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1021KB
MD589fb5c184b3df2af2d1e739f812ac8de
SHA19c010113de08370e551b3b5a92297590de4e645f
SHA256f33244fb4cc6606ab0ec6266b03e341da9dc446366d66403f598902b27a3eceb
SHA512ddeddb5063f8ad7aad6126243b1c7551f6998db484089e809c49d88a49d027f7cbb33ce7207073bcf91d4a5ae683ae5524095aae9d87e83eafbcb2f70d18cc24
-
Filesize
50B
MD5798e9d09e53254c0e70dd121cf63419b
SHA13b240d9315d03a03d447d7e48038b1d4a17e8167
SHA25651355a51199fd9af5654338e100c392da2fa7d30e42ed3314be20edaa4969ec3
SHA512e67804418a45570045cc52507333b6af1904e3b7f415cb1b58fb1af3887d6bc3d199db4aeac8c598d78370edc9a9870e2638475ac702281045923b86871ac5df
-
Filesize
1021KB
MD5427763a960b24044eeaceebad363d071
SHA119e6c01ef4e516d1dd3e5ca60da336be82106e3f
SHA256866c916c8d83888bedbd9c3de341980110e88a6fe8f7649afe76313101414c24
SHA5125bbcc7253bd5857b688b9078057398dcf8850ed79cc5f862f2b8dc27de7630a9a900300db550194673c79b0602fb8e213cc3b1d1e28470e59020d812d2098ee5