Analysis
-
max time kernel
32s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 19:20
Static task
static1
Behavioral task
behavioral1
Sample
a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe
-
Size
71KB
-
MD5
a3cdde4d17de1505f31cf6df00caf1ad
-
SHA1
2b39f4bf2a70ca0ca57f280cf07c2c835a3663e6
-
SHA256
94a2ec7f9b4a6dca1d1c4f33a2c3bcc6d3f667867c37b03e11f3d07ec78e7f90
-
SHA512
0b7c25e0a3f73aef5bbc369c8f71dbfe5f1f5ec0ad797b5bf53a9034441d7cad6053d3f2b2bfae372cbeaa51016ae7e35ab13d39144087ba7f471f96c63d123a
-
SSDEEP
768:+Lz1vSXs4nsmGEx8wf0jKaH/crbPMZlHSuJKtmG387GUUQB6WDbi6aefhejSXf0P:+Lzws4mExBqEIHTJKESqni6aicSXRK
Malware Config
Signatures
-
Disables RegEdit via registry modification 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" Process not Found Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe Set value (int) \REGISTRY\USER\S-1-5-21-3294248377-1418901787-4083263181-1000\Software\Microsoft\Windows\CurrentVersion\Policies\System\Disableregistrytools = "1" symsnreg.exe -
Disables Task Manager via registry modification
-
Disables use of System Restore points 1 TTPs
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts Process not Found File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe File opened for modification C:\Windows\system32\drivers\etc\hosts symsnreg.exe -
Executes dropped EXE 64 IoCs
pid Process 2712 symsnreg.exe 2832 symsnreg.exe 2180 symsnreg.exe 1368 symsnreg.exe 1216 symsnreg.exe 2288 symsnreg.exe 3000 symsnreg.exe 2204 symsnreg.exe 2304 symsnreg.exe 2988 symsnreg.exe 1732 symsnreg.exe 3032 symsnreg.exe 2060 symsnreg.exe 2928 symsnreg.exe 2492 symsnreg.exe 408 symsnreg.exe 2940 symsnreg.exe 2408 symsnreg.exe 3024 symsnreg.exe 1820 symsnreg.exe 1840 symsnreg.exe 2252 symsnreg.exe 2132 symsnreg.exe 2876 symsnreg.exe 1808 symsnreg.exe 944 symsnreg.exe 692 symsnreg.exe 3148 symsnreg.exe 3256 symsnreg.exe 3376 symsnreg.exe 3512 symsnreg.exe 3580 symsnreg.exe 3692 symsnreg.exe 3824 symsnreg.exe 3968 symsnreg.exe 4036 symsnreg.exe 3160 symsnreg.exe 3348 symsnreg.exe 3600 symsnreg.exe 3688 symsnreg.exe 3968 symsnreg.exe 4076 symsnreg.exe 3460 symsnreg.exe 3604 symsnreg.exe 3656 symsnreg.exe 3664 symsnreg.exe 4024 symsnreg.exe 4176 symsnreg.exe 4300 symsnreg.exe 4428 symsnreg.exe 4548 symsnreg.exe 4616 symsnreg.exe 4764 symsnreg.exe 4820 symsnreg.exe 5012 symsnreg.exe 5020 symsnreg.exe 4380 symsnreg.exe 4436 symsnreg.exe 4660 symsnreg.exe 4808 symsnreg.exe 4116 symsnreg.exe 4212 symsnreg.exe 4932 symsnreg.exe 5060 symsnreg.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe -
Loads dropped DLL 64 IoCs
pid Process 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 2712 symsnreg.exe 2832 symsnreg.exe 2832 symsnreg.exe 2180 symsnreg.exe 1368 symsnreg.exe 1368 symsnreg.exe 2288 symsnreg.exe 2288 symsnreg.exe 2204 symsnreg.exe 2204 symsnreg.exe 2988 symsnreg.exe 2988 symsnreg.exe 3032 symsnreg.exe 3032 symsnreg.exe 2928 symsnreg.exe 2928 symsnreg.exe 408 symsnreg.exe 408 symsnreg.exe 2408 symsnreg.exe 2408 symsnreg.exe 1820 symsnreg.exe 1820 symsnreg.exe 2252 symsnreg.exe 2252 symsnreg.exe 2876 symsnreg.exe 2876 symsnreg.exe 944 symsnreg.exe 944 symsnreg.exe 3148 symsnreg.exe 3148 symsnreg.exe 3376 symsnreg.exe 3376 symsnreg.exe 3580 symsnreg.exe 3580 symsnreg.exe 3824 symsnreg.exe 3824 symsnreg.exe 4036 symsnreg.exe 4036 symsnreg.exe 3348 symsnreg.exe 3348 symsnreg.exe 3688 symsnreg.exe 3688 symsnreg.exe 4076 symsnreg.exe 4076 symsnreg.exe 3604 symsnreg.exe 3604 symsnreg.exe 3664 symsnreg.exe 3664 symsnreg.exe 4176 symsnreg.exe 4176 symsnreg.exe 4428 symsnreg.exe 4428 symsnreg.exe 4616 symsnreg.exe 4616 symsnreg.exe 4820 symsnreg.exe 4820 symsnreg.exe 5020 symsnreg.exe 5020 symsnreg.exe 4436 symsnreg.exe 4436 symsnreg.exe 4808 symsnreg.exe 4808 symsnreg.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Symantec Registry Server = "symsnreg.exe" symsnreg.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe Process not Found File created C:\Windows\SysWOW64\symsnreg.exe a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe Process not Found File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe Process not Found File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File opened for modification C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe File created C:\Windows\SysWOW64\symsnreg.exe symsnreg.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2544 set thread context of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2712 set thread context of 2832 2712 symsnreg.exe 32 PID 2180 set thread context of 1368 2180 symsnreg.exe 48 PID 1216 set thread context of 2288 1216 symsnreg.exe 56 PID 3000 set thread context of 2204 3000 symsnreg.exe 68 PID 2304 set thread context of 2988 2304 symsnreg.exe 85 PID 1732 set thread context of 3032 1732 symsnreg.exe 92 PID 2060 set thread context of 2928 2060 symsnreg.exe 110 PID 2492 set thread context of 408 2492 symsnreg.exe 123 PID 2940 set thread context of 2408 2940 symsnreg.exe 168 PID 3024 set thread context of 1820 3024 symsnreg.exe 144 PID 1840 set thread context of 2252 1840 symsnreg.exe 152 PID 2132 set thread context of 2876 2132 symsnreg.exe 169 PID 1808 set thread context of 944 1808 symsnreg.exe 280 PID 692 set thread context of 3148 692 symsnreg.exe 197 PID 3256 set thread context of 3376 3256 symsnreg.exe 208 PID 3512 set thread context of 3580 3512 symsnreg.exe 217 PID 3692 set thread context of 3824 3692 symsnreg.exe 232 PID 3968 set thread context of 4036 3968 symsnreg.exe 241 PID 3160 set thread context of 3348 3160 symsnreg.exe 255 PID 3600 set thread context of 3688 3600 symsnreg.exe 265 PID 3968 set thread context of 4076 3968 symsnreg.exe 276 PID 3460 set thread context of 3604 3460 symsnreg.exe 284 PID 3656 set thread context of 3664 3656 symsnreg.exe 303 PID 4024 set thread context of 4176 4024 symsnreg.exe 315 PID 4300 set thread context of 4428 4300 symsnreg.exe 329 PID 4548 set thread context of 4616 4548 symsnreg.exe 337 PID 4764 set thread context of 4820 4764 symsnreg.exe 348 PID 5012 set thread context of 5020 5012 symsnreg.exe 356 PID 4380 set thread context of 4436 4380 symsnreg.exe 375 PID 4660 set thread context of 4808 4660 symsnreg.exe 384 PID 4116 set thread context of 4212 4116 symsnreg.exe 400 PID 4932 set thread context of 5060 4932 symsnreg.exe 410 PID 4932 set thread context of 4472 4932 symsnreg.exe 423 PID 5212 set thread context of 5280 5212 symsnreg.exe 433 PID 5424 set thread context of 5504 5424 symsnreg.exe 445 PID 5652 set thread context of 5704 5652 symsnreg.exe 455 PID 5864 set thread context of 5912 5864 symsnreg.exe 466 PID 6124 set thread context of 4652 6124 symsnreg.exe 480 PID 5404 set thread context of 5556 5404 symsnreg.exe 495 PID 5908 set thread context of 6008 5908 symsnreg.exe 507 PID 5272 set thread context of 5588 5272 symsnreg.exe 521 PID 6032 set thread context of 6040 6032 symsnreg.exe 658 PID 6136 set thread context of 6172 6136 symsnreg.exe 544 PID 6308 set thread context of 6376 6308 symsnreg.exe 553 PID 6520 set thread context of 6612 6520 symsnreg.exe 566 PID 6772 set thread context of 6840 6772 symsnreg.exe 577 PID 6984 set thread context of 7080 6984 symsnreg.exe 590 PID 6168 set thread context of 6268 6168 symsnreg.exe 601 PID 6588 set thread context of 6624 6588 symsnreg.exe 608 PID 6980 set thread context of 7116 6980 symsnreg.exe 625 PID 6416 set thread context of 6744 6416 symsnreg.exe 640 PID 6136 set thread context of 6272 6136 symsnreg.exe 649 PID 6596 set thread context of 7208 6596 symsnreg.exe 665 PID 7316 set thread context of 7396 7316 symsnreg.exe 674 PID 7564 set thread context of 7636 7564 symsnreg.exe 685 PID 7800 set thread context of 7856 7800 symsnreg.exe 697 PID 7988 set thread context of 8080 7988 symsnreg.exe 710 PID 7220 set thread context of 7176 7220 symsnreg.exe 720 PID 7668 set thread context of 7672 7668 symsnreg.exe 728 PID 8000 set thread context of 6736 8000 symsnreg.exe 879 PID 7508 set thread context of 7900 7508 symsnreg.exe 759 PID 7328 set thread context of 7500 7328 symsnreg.exe 771 PID 7304 set thread context of 7212 7304 symsnreg.exe 775 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language symsnreg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2832 symsnreg.exe Token: SeIncBasePriorityPrivilege 1368 symsnreg.exe Token: SeIncBasePriorityPrivilege 2288 symsnreg.exe Token: SeIncBasePriorityPrivilege 2204 symsnreg.exe Token: SeIncBasePriorityPrivilege 2988 symsnreg.exe Token: SeIncBasePriorityPrivilege 3032 symsnreg.exe Token: SeIncBasePriorityPrivilege 2928 symsnreg.exe Token: SeIncBasePriorityPrivilege 408 symsnreg.exe Token: SeIncBasePriorityPrivilege 2408 symsnreg.exe Token: SeIncBasePriorityPrivilege 1820 symsnreg.exe Token: SeIncBasePriorityPrivilege 2252 symsnreg.exe Token: SeIncBasePriorityPrivilege 2876 symsnreg.exe Token: SeIncBasePriorityPrivilege 944 symsnreg.exe Token: SeIncBasePriorityPrivilege 3148 symsnreg.exe Token: SeIncBasePriorityPrivilege 3376 symsnreg.exe Token: SeIncBasePriorityPrivilege 3580 symsnreg.exe Token: SeIncBasePriorityPrivilege 3824 symsnreg.exe Token: SeIncBasePriorityPrivilege 4036 symsnreg.exe Token: SeIncBasePriorityPrivilege 3348 symsnreg.exe Token: SeIncBasePriorityPrivilege 3688 symsnreg.exe Token: SeIncBasePriorityPrivilege 4076 symsnreg.exe Token: SeIncBasePriorityPrivilege 3604 symsnreg.exe Token: SeIncBasePriorityPrivilege 3664 symsnreg.exe Token: SeIncBasePriorityPrivilege 4176 symsnreg.exe Token: SeIncBasePriorityPrivilege 4428 symsnreg.exe Token: SeIncBasePriorityPrivilege 4616 symsnreg.exe Token: SeIncBasePriorityPrivilege 4820 symsnreg.exe Token: SeIncBasePriorityPrivilege 5020 symsnreg.exe Token: SeIncBasePriorityPrivilege 4436 symsnreg.exe Token: SeIncBasePriorityPrivilege 4808 symsnreg.exe Token: SeIncBasePriorityPrivilege 4212 symsnreg.exe Token: SeIncBasePriorityPrivilege 5060 symsnreg.exe Token: SeIncBasePriorityPrivilege 4472 symsnreg.exe Token: SeIncBasePriorityPrivilege 5280 symsnreg.exe Token: SeIncBasePriorityPrivilege 5504 symsnreg.exe Token: SeIncBasePriorityPrivilege 5704 symsnreg.exe Token: SeIncBasePriorityPrivilege 5912 symsnreg.exe Token: SeIncBasePriorityPrivilege 4652 symsnreg.exe Token: SeIncBasePriorityPrivilege 5556 symsnreg.exe Token: SeIncBasePriorityPrivilege 6008 symsnreg.exe Token: SeIncBasePriorityPrivilege 5588 symsnreg.exe Token: SeIncBasePriorityPrivilege 6040 symsnreg.exe Token: SeIncBasePriorityPrivilege 6172 symsnreg.exe Token: SeIncBasePriorityPrivilege 6376 symsnreg.exe Token: SeIncBasePriorityPrivilege 6612 symsnreg.exe Token: SeIncBasePriorityPrivilege 6840 symsnreg.exe Token: SeIncBasePriorityPrivilege 7080 symsnreg.exe Token: SeIncBasePriorityPrivilege 6268 symsnreg.exe Token: SeIncBasePriorityPrivilege 6624 symsnreg.exe Token: SeIncBasePriorityPrivilege 7116 symsnreg.exe Token: SeIncBasePriorityPrivilege 6744 symsnreg.exe Token: SeIncBasePriorityPrivilege 6272 symsnreg.exe Token: SeIncBasePriorityPrivilege 7208 symsnreg.exe Token: SeIncBasePriorityPrivilege 7396 symsnreg.exe Token: SeIncBasePriorityPrivilege 7636 symsnreg.exe Token: SeIncBasePriorityPrivilege 7856 symsnreg.exe Token: SeIncBasePriorityPrivilege 8080 symsnreg.exe Token: SeIncBasePriorityPrivilege 7176 symsnreg.exe Token: SeIncBasePriorityPrivilege 7672 symsnreg.exe Token: SeIncBasePriorityPrivilege 6736 symsnreg.exe Token: SeIncBasePriorityPrivilege 7900 symsnreg.exe Token: SeIncBasePriorityPrivilege 7500 symsnreg.exe Token: SeIncBasePriorityPrivilege 7212 symsnreg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2544 wrote to memory of 2400 2544 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 30 PID 2400 wrote to memory of 2712 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2712 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2712 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 31 PID 2400 wrote to memory of 2712 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 31 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2712 wrote to memory of 2832 2712 symsnreg.exe 32 PID 2400 wrote to memory of 2788 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 33 PID 2400 wrote to memory of 2788 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 33 PID 2400 wrote to memory of 2788 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 33 PID 2400 wrote to memory of 2788 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 33 PID 2400 wrote to memory of 2764 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 34 PID 2400 wrote to memory of 2764 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 34 PID 2400 wrote to memory of 2764 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 34 PID 2400 wrote to memory of 2764 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 34 PID 2400 wrote to memory of 2636 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 36 PID 2400 wrote to memory of 2636 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 36 PID 2400 wrote to memory of 2636 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 36 PID 2400 wrote to memory of 2636 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 36 PID 2400 wrote to memory of 2780 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2780 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2780 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2780 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 37 PID 2400 wrote to memory of 2120 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 38 PID 2400 wrote to memory of 2120 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 38 PID 2400 wrote to memory of 2120 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 38 PID 2400 wrote to memory of 2120 2400 a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe 38 PID 2832 wrote to memory of 2180 2832 symsnreg.exe 139 PID 2832 wrote to memory of 2180 2832 symsnreg.exe 139 PID 2832 wrote to memory of 2180 2832 symsnreg.exe 139 PID 2832 wrote to memory of 2180 2832 symsnreg.exe 139 PID 2832 wrote to memory of 2100 2832 symsnreg.exe 44 PID 2832 wrote to memory of 2100 2832 symsnreg.exe 44 PID 2832 wrote to memory of 2100 2832 symsnreg.exe 44 PID 2832 wrote to memory of 2100 2832 symsnreg.exe 44 PID 2832 wrote to memory of 1716 2832 symsnreg.exe 45 PID 2832 wrote to memory of 1716 2832 symsnreg.exe 45 PID 2832 wrote to memory of 1716 2832 symsnreg.exe 45 PID 2832 wrote to memory of 1716 2832 symsnreg.exe 45 PID 2832 wrote to memory of 812 2832 symsnreg.exe 46 PID 2832 wrote to memory of 812 2832 symsnreg.exe 46 PID 2832 wrote to memory of 812 2832 symsnreg.exe 46 PID 2832 wrote to memory of 812 2832 symsnreg.exe 46 PID 2832 wrote to memory of 2424 2832 symsnreg.exe 47 PID 2832 wrote to memory of 2424 2832 symsnreg.exe 47 PID 2832 wrote to memory of 2424 2832 symsnreg.exe 47 PID 2832 wrote to memory of 2424 2832 symsnreg.exe 47 PID 2180 wrote to memory of 1368 2180 symsnreg.exe 48 PID 2180 wrote to memory of 1368 2180 symsnreg.exe 48
Processes
-
C:\Users\Admin\AppData\Local\Temp\a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a3cdde4d17de1505f31cf6df00caf1ad_JaffaCakes118.exe"2⤵
- Disables RegEdit via registry modification
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"4⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"6⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1368 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1216 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2288 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3000 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"10⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2204 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"12⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2988 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1732 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"14⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2060 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"16⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2928 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2492 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"18⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:408 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2940 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"20⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2408 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3024 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1820 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1840 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"24⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2252 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2132 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2876 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1808 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"28⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:944 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:692 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3148 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3256 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"32⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3376 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3512 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3580 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3692 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3824 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3968 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"38⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3160 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3348 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3600 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3688 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3968 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4076 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3460 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"46⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:3604 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3656 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"48⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4024 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"50⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4176 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4300 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"52⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4428 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4548 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"54⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4616 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4764 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4820 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5012 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"58⤵
- Disables RegEdit via registry modification
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:5020 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4380 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"60⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:4436 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4660 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"62⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4808 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4116 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"64⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4212 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4932 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"66⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5060 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"67⤵
- Suspicious use of SetThreadContext
PID:4932 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"68⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4472 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"69⤵
- Suspicious use of SetThreadContext
PID:5212 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"70⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5280 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"71⤵
- Suspicious use of SetThreadContext
PID:5424 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"72⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5504 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"73⤵
- Suspicious use of SetThreadContext
PID:5652 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"74⤵
- Disables RegEdit via registry modification
- Suspicious use of AdjustPrivilegeToken
PID:5704 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"75⤵
- Suspicious use of SetThreadContext
PID:5864 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"76⤵
- Disables RegEdit via registry modification
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:5912 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"77⤵
- Suspicious use of SetThreadContext
PID:6124 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"78⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4652 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"79⤵
- Suspicious use of SetThreadContext
PID:5404 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"80⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5556 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"81⤵
- Suspicious use of SetThreadContext
PID:5908 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"82⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:6008 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"83⤵
- Suspicious use of SetThreadContext
PID:5272 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"84⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:5588 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"85⤵
- Suspicious use of SetThreadContext
PID:6032 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"86⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:6040 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"87⤵
- Suspicious use of SetThreadContext
PID:6136 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"88⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:6172 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"89⤵
- Suspicious use of SetThreadContext
PID:6308 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"90⤵
- Disables RegEdit via registry modification
- Suspicious use of AdjustPrivilegeToken
PID:6376 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"91⤵
- Suspicious use of SetThreadContext
PID:6520 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"92⤵
- Suspicious use of AdjustPrivilegeToken
PID:6612 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"93⤵
- Suspicious use of SetThreadContext
PID:6772 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"94⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:6840 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6984 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"96⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:7080 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"97⤵
- Suspicious use of SetThreadContext
PID:6168 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"98⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:6268 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"99⤵
- Suspicious use of SetThreadContext
PID:6588 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"100⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:6624 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"101⤵
- Suspicious use of SetThreadContext
PID:6980 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"102⤵
- Disables RegEdit via registry modification
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:7116 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"103⤵
- Suspicious use of SetThreadContext
PID:6416 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"104⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:6744 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"105⤵
- Suspicious use of SetThreadContext
PID:6136 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"106⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:6272 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"107⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:6596 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"108⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:7208 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"109⤵
- Suspicious use of SetThreadContext
PID:7316 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"110⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:7396 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"111⤵
- Suspicious use of SetThreadContext
PID:7564 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"112⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:7636 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"113⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7800 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"114⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:7856 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"115⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:7988 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"116⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:8080 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"117⤵
- Suspicious use of SetThreadContext
PID:7220 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"118⤵
- Disables RegEdit via registry modification
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:7176 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"119⤵
- Suspicious use of SetThreadContext
PID:7668 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"120⤵
- Disables RegEdit via registry modification
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:7672 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\system32\symsnreg.exe"121⤵
- Suspicious use of SetThreadContext
PID:8000 -
C:\Windows\SysWOW64\symsnreg.exe"C:\Windows\SysWOW64\symsnreg.exe"122⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:6736
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-