Analysis
-
max time kernel
135s -
max time network
142s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe
-
Size
115KB
-
MD5
a896c9cfa9bc88f8a1c7fcfab6a25e3d
-
SHA1
e9157e41f987ed24fc2ca4b166e8fdc6b26dfe9b
-
SHA256
e61e4603c6e79bd715819ad617f286ee65c4ab771e4b71d2f8c4a638bc53782c
-
SHA512
df9d671e1c533ed68165141a1f9b09566a629f0ec7b306f54dc6b8560ebf75f56b4f3925079656493ff702e4aab2122fd2fce46615d00e65605cc3a9ad8c1ca8
-
SSDEEP
3072:LwUeOVnUFEckGZTMvFvAyBDON/+nGKr3P128/8y:l1YVklvFvDBDONaPA8/8
Malware Config
Signatures
-
Executes dropped EXE 55 IoCs
pid Process 5104 AdvancedInstallersk.exe 4984 12520437a.exe 4008 acluie.exe 3616 ActionCenterl.exe 4824 acleditd.exe 3908 adproviderh.exe 1304 @VpnToastIconv.exe 1656 ActivationManagerx.exe 2756 ActionCentery.exe 4344 @AudioToastIconb.exe 5076 ActivationManagerxf.exe 4852 acluio.exe 2636 AcWinRTt.exe 2480 AcSpecfcc.exe 60 ActionCenterla.exe 4488 adprovidere.exe 440 activedsf.exe 3636 ActionCenterle.exe 1920 @VpnToastIconvp.exe 3916 acluia.exe 4884 AccountsRtc.exe 4916 AarSvcz.exe 4820 @VpnToastIconu.exe 4772 @EnrollmentToastIcond.exe 3496 accountaccessorx.exe 4120 AcLayersp.exe 4284 acluiee.exe 3904 aadtbc.exe 4624 @VpnToastIconuf.exe 728 activedsg.exe 220 acluiau.exe 1620 @EnrollmentToastIcondh.exe 3076 accountaccessorxn.exe 1276 acluioo.exe 4568 12520437t.exe 1040 aadtbcs.exe 1216 AcSpecfck.exe 540 @AppHelpToasts.exe 4736 AccountsRtcy.exe 2344 @WirelessDisplayToasth.exe 3880 acluieev.exe 2524 acluib.exe 3144 AccountsRtl.exe 4904 @VpnToastIconc.exe 1384 @VpnToastIconvg.exe 4160 aadtbq.exe 1872 @AudioToastIcony.exe 2572 aadtbj.exe 4656 12520437td.exe 3328 @EnrollmentToastIconx.exe 1008 aadtbcsb.exe 2732 acluiaq.exe 544 @AudioToastIcono.exe 2400 aadtbcc.exe 2004 @EnrollmentToastIcondc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\acluio.exe ActivationManagerxf.exe File opened for modification C:\Windows\SysWOW64\ActionCenterla.exe AcSpecfcc.exe File created C:\Windows\SysWOW64\accountaccessorxn.exe @EnrollmentToastIcondh.exe File created C:\Windows\SysWOW64\acleditd.exe ActionCenterl.exe File created C:\Windows\SysWOW64\acluia.exe @VpnToastIconvp.exe File opened for modification C:\Windows\SysWOW64\AcLayersp.exe accountaccessorx.exe File created C:\Windows\SysWOW64\@EnrollmentToastIcondc.exe aadtbcc.exe File created C:\Windows\SysWOW64\AcLayersp.exe accountaccessorx.exe File created C:\Windows\SysWOW64\@AudioToastIcony.exe aadtbq.exe File opened for modification C:\Windows\SysWOW64\@VpnToastIconv.exe adproviderh.exe File opened for modification C:\Windows\SysWOW64\adprovidere.exe ActionCenterla.exe File created C:\Windows\SysWOW64\acluiee.exe AcLayersp.exe File opened for modification C:\Windows\SysWOW64\@AppHelpToasts.exe AcSpecfck.exe File created C:\Windows\SysWOW64\12520437a.exe AdvancedInstallersk.exe File created C:\Windows\SysWOW64\@VpnToastIconv.exe adproviderh.exe File created C:\Windows\SysWOW64\activedsf.exe adprovidere.exe File opened for modification C:\Windows\SysWOW64\AarSvcz.exe AccountsRtc.exe File created C:\Windows\SysWOW64\@VpnToastIconu.exe AarSvcz.exe File opened for modification C:\Windows\SysWOW64\ActionCenterl.exe acluie.exe File created C:\Windows\SysWOW64\AarSvcz.exe AccountsRtc.exe File opened for modification C:\Windows\SysWOW64\accountaccessorx.exe @EnrollmentToastIcond.exe File opened for modification C:\Windows\SysWOW64\@AudioToastIcony.exe aadtbq.exe File created C:\Windows\SysWOW64\acluie.exe 12520437a.exe File opened for modification C:\Windows\SysWOW64\acluiee.exe AcLayersp.exe File opened for modification C:\Windows\SysWOW64\@VpnToastIconuf.exe aadtbc.exe File created C:\Windows\SysWOW64\@VpnToastIconvg.exe @VpnToastIconc.exe File created C:\Windows\SysWOW64\@AudioToastIcono.exe acluiaq.exe File created C:\Windows\SysWOW64\aadtbcc.exe @AudioToastIcono.exe File created C:\Windows\SysWOW64\adproviderh.exe acleditd.exe File opened for modification C:\Windows\SysWOW64\AccountsRtc.exe acluia.exe File created C:\Windows\SysWOW64\activedsg.exe @VpnToastIconuf.exe File created C:\Windows\SysWOW64\ActionCentery.exe ActivationManagerx.exe File created C:\Windows\SysWOW64\aadtbq.exe @VpnToastIconvg.exe File created C:\Windows\SysWOW64\aadtbj.exe @AudioToastIcony.exe File opened for modification C:\Windows\SysWOW64\@VpnToastIconu.exe AarSvcz.exe File created C:\Windows\SysWOW64\@AppHelpToasts.exe AcSpecfck.exe File created C:\Windows\SysWOW64\acluieev.exe @WirelessDisplayToasth.exe File created C:\Windows\SysWOW64\AccountsRtc.exe acluia.exe File opened for modification C:\Windows\SysWOW64\AcSpecfck.exe aadtbcs.exe File created C:\Windows\SysWOW64\acluib.exe acluieev.exe File opened for modification C:\Windows\SysWOW64\aadtbj.exe @AudioToastIcony.exe File opened for modification C:\Windows\SysWOW64\acluiaq.exe aadtbcsb.exe File opened for modification C:\Windows\SysWOW64\AcWinRTt.exe acluio.exe File created C:\Windows\SysWOW64\ActivationManagerxf.exe @AudioToastIconb.exe File created C:\Windows\SysWOW64\@VpnToastIconvp.exe ActionCenterle.exe File created C:\Windows\SysWOW64\@EnrollmentToastIcond.exe @VpnToastIconu.exe File opened for modification C:\Windows\SysWOW64\aadtbcs.exe 12520437t.exe File opened for modification C:\Windows\SysWOW64\@EnrollmentToastIcondc.exe aadtbcc.exe File created C:\Windows\SysWOW64\AcSpecfcc.exe AcWinRTt.exe File opened for modification C:\Windows\SysWOW64\@VpnToastIconvp.exe ActionCenterle.exe File opened for modification C:\Windows\SysWOW64\@EnrollmentToastIcond.exe @VpnToastIconu.exe File opened for modification C:\Windows\SysWOW64\acluiau.exe activedsg.exe File opened for modification C:\Windows\SysWOW64\accountaccessorxn.exe @EnrollmentToastIcondh.exe File opened for modification C:\Windows\SysWOW64\12520437t.exe acluioo.exe File opened for modification C:\Windows\SysWOW64\acleditd.exe ActionCenterl.exe File created C:\Windows\SysWOW64\ActivationManagerx.exe @VpnToastIconv.exe File opened for modification C:\Windows\SysWOW64\acluio.exe ActivationManagerxf.exe File created C:\Windows\SysWOW64\12520437t.exe acluioo.exe File opened for modification C:\Windows\SysWOW64\aadtbcsb.exe @EnrollmentToastIconx.exe File opened for modification C:\Windows\SysWOW64\ActivationManagerx.exe @VpnToastIconv.exe File created C:\Windows\SysWOW64\Þ]\w @EnrollmentToastIcondc.exe File created C:\Windows\SysWOW64\ActionCenterla.exe AcSpecfcc.exe File created C:\Windows\SysWOW64\acluiaq.exe aadtbcsb.exe File created C:\Windows\SysWOW64\@VpnToastIconuf.exe aadtbc.exe -
System Location Discovery: System Language Discovery 1 TTPs 56 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluie.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcWinRTt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AccountsRtcy.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @EnrollmentToastIcondc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadtbcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12520437a.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActionCenterl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AccountsRtc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcLayersp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language activedsg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActionCentery.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @VpnToastIconu.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @AppHelpToasts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadtbj.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @AudioToastIconb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language accountaccessorx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluiau.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @EnrollmentToastIcondh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AarSvcz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @AudioToastIcono.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AdvancedInstallersk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language accountaccessorxn.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadtbcs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadtbq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12520437td.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language activedsf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluieev.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @WirelessDisplayToasth.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluio.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActionCenterla.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adprovidere.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @EnrollmentToastIcond.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @VpnToastIconc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @EnrollmentToastIconx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluiaq.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @VpnToastIconv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActivationManagerx.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActivationManagerxf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ActionCenterle.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @VpnToastIconvg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @VpnToastIconvp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @VpnToastIconuf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluioo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 12520437t.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acluiee.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcSpecfck.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language @AudioToastIcony.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadtbcsb.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language acleditd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language adproviderh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcSpecfcc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aadtbc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AccountsRtl.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 556 wrote to memory of 5104 556 a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe 84 PID 556 wrote to memory of 5104 556 a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe 84 PID 556 wrote to memory of 5104 556 a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe 84 PID 5104 wrote to memory of 4984 5104 AdvancedInstallersk.exe 85 PID 5104 wrote to memory of 4984 5104 AdvancedInstallersk.exe 85 PID 5104 wrote to memory of 4984 5104 AdvancedInstallersk.exe 85 PID 4984 wrote to memory of 4008 4984 12520437a.exe 86 PID 4984 wrote to memory of 4008 4984 12520437a.exe 86 PID 4984 wrote to memory of 4008 4984 12520437a.exe 86 PID 4008 wrote to memory of 3616 4008 acluie.exe 87 PID 4008 wrote to memory of 3616 4008 acluie.exe 87 PID 4008 wrote to memory of 3616 4008 acluie.exe 87 PID 3616 wrote to memory of 4824 3616 ActionCenterl.exe 88 PID 3616 wrote to memory of 4824 3616 ActionCenterl.exe 88 PID 3616 wrote to memory of 4824 3616 ActionCenterl.exe 88 PID 4824 wrote to memory of 3908 4824 acleditd.exe 89 PID 4824 wrote to memory of 3908 4824 acleditd.exe 89 PID 4824 wrote to memory of 3908 4824 acleditd.exe 89 PID 3908 wrote to memory of 1304 3908 adproviderh.exe 90 PID 3908 wrote to memory of 1304 3908 adproviderh.exe 90 PID 3908 wrote to memory of 1304 3908 adproviderh.exe 90 PID 1304 wrote to memory of 1656 1304 @VpnToastIconv.exe 91 PID 1304 wrote to memory of 1656 1304 @VpnToastIconv.exe 91 PID 1304 wrote to memory of 1656 1304 @VpnToastIconv.exe 91 PID 1656 wrote to memory of 2756 1656 ActivationManagerx.exe 92 PID 1656 wrote to memory of 2756 1656 ActivationManagerx.exe 92 PID 1656 wrote to memory of 2756 1656 ActivationManagerx.exe 92 PID 2756 wrote to memory of 4344 2756 ActionCentery.exe 93 PID 2756 wrote to memory of 4344 2756 ActionCentery.exe 93 PID 2756 wrote to memory of 4344 2756 ActionCentery.exe 93 PID 4344 wrote to memory of 5076 4344 @AudioToastIconb.exe 94 PID 4344 wrote to memory of 5076 4344 @AudioToastIconb.exe 94 PID 4344 wrote to memory of 5076 4344 @AudioToastIconb.exe 94 PID 5076 wrote to memory of 4852 5076 ActivationManagerxf.exe 95 PID 5076 wrote to memory of 4852 5076 ActivationManagerxf.exe 95 PID 5076 wrote to memory of 4852 5076 ActivationManagerxf.exe 95 PID 4852 wrote to memory of 2636 4852 acluio.exe 96 PID 4852 wrote to memory of 2636 4852 acluio.exe 96 PID 4852 wrote to memory of 2636 4852 acluio.exe 96 PID 2636 wrote to memory of 2480 2636 AcWinRTt.exe 97 PID 2636 wrote to memory of 2480 2636 AcWinRTt.exe 97 PID 2636 wrote to memory of 2480 2636 AcWinRTt.exe 97 PID 2480 wrote to memory of 60 2480 AcSpecfcc.exe 98 PID 2480 wrote to memory of 60 2480 AcSpecfcc.exe 98 PID 2480 wrote to memory of 60 2480 AcSpecfcc.exe 98 PID 60 wrote to memory of 4488 60 ActionCenterla.exe 99 PID 60 wrote to memory of 4488 60 ActionCenterla.exe 99 PID 60 wrote to memory of 4488 60 ActionCenterla.exe 99 PID 4488 wrote to memory of 440 4488 adprovidere.exe 100 PID 4488 wrote to memory of 440 4488 adprovidere.exe 100 PID 4488 wrote to memory of 440 4488 adprovidere.exe 100 PID 440 wrote to memory of 3636 440 activedsf.exe 102 PID 440 wrote to memory of 3636 440 activedsf.exe 102 PID 440 wrote to memory of 3636 440 activedsf.exe 102 PID 3636 wrote to memory of 1920 3636 ActionCenterle.exe 103 PID 3636 wrote to memory of 1920 3636 ActionCenterle.exe 103 PID 3636 wrote to memory of 1920 3636 ActionCenterle.exe 103 PID 1920 wrote to memory of 3916 1920 @VpnToastIconvp.exe 104 PID 1920 wrote to memory of 3916 1920 @VpnToastIconvp.exe 104 PID 1920 wrote to memory of 3916 1920 @VpnToastIconvp.exe 104 PID 3916 wrote to memory of 4884 3916 acluia.exe 106 PID 3916 wrote to memory of 4884 3916 acluia.exe 106 PID 3916 wrote to memory of 4884 3916 acluia.exe 106 PID 4884 wrote to memory of 4916 4884 AccountsRtc.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a896c9cfa9bc88f8a1c7fcfab6a25e3d_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\AdvancedInstallersk.exeC:\Windows\system32\AdvancedInstallersk.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\12520437a.exeC:\Windows\system32\12520437a.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\acluie.exeC:\Windows\system32\acluie.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\ActionCenterl.exeC:\Windows\system32\ActionCenterl.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3616 -
C:\Windows\SysWOW64\acleditd.exeC:\Windows\system32\acleditd.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4824 -
C:\Windows\SysWOW64\adproviderh.exeC:\Windows\system32\adproviderh.exe7⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\@VpnToastIconv.exeC:\Windows\system32\@VpnToastIconv.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\ActivationManagerx.exeC:\Windows\system32\ActivationManagerx.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Windows\SysWOW64\ActionCentery.exeC:\Windows\system32\ActionCentery.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\@AudioToastIconb.exeC:\Windows\system32\@AudioToastIconb.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\ActivationManagerxf.exeC:\Windows\system32\ActivationManagerxf.exe12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5076 -
C:\Windows\SysWOW64\acluio.exeC:\Windows\system32\acluio.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\AcWinRTt.exeC:\Windows\system32\AcWinRTt.exe14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\AcSpecfcc.exeC:\Windows\system32\AcSpecfcc.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\ActionCenterla.exeC:\Windows\system32\ActionCenterla.exe16⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:60 -
C:\Windows\SysWOW64\adprovidere.exeC:\Windows\system32\adprovidere.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4488 -
C:\Windows\SysWOW64\activedsf.exeC:\Windows\system32\activedsf.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:440 -
C:\Windows\SysWOW64\ActionCenterle.exeC:\Windows\system32\ActionCenterle.exe19⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3636 -
C:\Windows\SysWOW64\@VpnToastIconvp.exeC:\Windows\system32\@VpnToastIconvp.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1920 -
C:\Windows\SysWOW64\acluia.exeC:\Windows\system32\acluia.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3916 -
C:\Windows\SysWOW64\AccountsRtc.exeC:\Windows\system32\AccountsRtc.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Windows\SysWOW64\AarSvcz.exeC:\Windows\system32\AarSvcz.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4916 -
C:\Windows\SysWOW64\@VpnToastIconu.exeC:\Windows\system32\@VpnToastIconu.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4820 -
C:\Windows\SysWOW64\@EnrollmentToastIcond.exeC:\Windows\system32\@EnrollmentToastIcond.exe25⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4772 -
C:\Windows\SysWOW64\accountaccessorx.exeC:\Windows\system32\accountaccessorx.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\SysWOW64\AcLayersp.exeC:\Windows\system32\AcLayersp.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4120 -
C:\Windows\SysWOW64\acluiee.exeC:\Windows\system32\acluiee.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\aadtbc.exeC:\Windows\system32\aadtbc.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3904 -
C:\Windows\SysWOW64\@VpnToastIconuf.exeC:\Windows\system32\@VpnToastIconuf.exe30⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4624 -
C:\Windows\SysWOW64\activedsg.exeC:\Windows\system32\activedsg.exe31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:728 -
C:\Windows\SysWOW64\acluiau.exeC:\Windows\system32\acluiau.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:220 -
C:\Windows\SysWOW64\@EnrollmentToastIcondh.exeC:\Windows\system32\@EnrollmentToastIcondh.exe33⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\accountaccessorxn.exeC:\Windows\system32\accountaccessorxn.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3076 -
C:\Windows\SysWOW64\acluioo.exeC:\Windows\system32\acluioo.exe35⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\12520437t.exeC:\Windows\system32\12520437t.exe36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4568 -
C:\Windows\SysWOW64\aadtbcs.exeC:\Windows\system32\aadtbcs.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1040 -
C:\Windows\SysWOW64\AcSpecfck.exeC:\Windows\system32\AcSpecfck.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\@AppHelpToasts.exeC:\Windows\system32\@AppHelpToasts.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:540 -
C:\Windows\SysWOW64\AccountsRtcy.exeC:\Windows\system32\AccountsRtcy.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4736 -
C:\Windows\SysWOW64\@WirelessDisplayToasth.exeC:\Windows\system32\@WirelessDisplayToasth.exe41⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2344 -
C:\Windows\SysWOW64\acluieev.exeC:\Windows\system32\acluieev.exe42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3880 -
C:\Windows\SysWOW64\acluib.exeC:\Windows\system32\acluib.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2524 -
C:\Windows\SysWOW64\AccountsRtl.exeC:\Windows\system32\AccountsRtl.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Windows\SysWOW64\@VpnToastIconc.exeC:\Windows\system32\@VpnToastIconc.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4904 -
C:\Windows\SysWOW64\@VpnToastIconvg.exeC:\Windows\system32\@VpnToastIconvg.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1384 -
C:\Windows\SysWOW64\aadtbq.exeC:\Windows\system32\aadtbq.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4160 -
C:\Windows\SysWOW64\@AudioToastIcony.exeC:\Windows\system32\@AudioToastIcony.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1872 -
C:\Windows\SysWOW64\aadtbj.exeC:\Windows\system32\aadtbj.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2572 -
C:\Windows\SysWOW64\12520437td.exeC:\Windows\system32\12520437td.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4656 -
C:\Windows\SysWOW64\@EnrollmentToastIconx.exeC:\Windows\system32\@EnrollmentToastIconx.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3328 -
C:\Windows\SysWOW64\aadtbcsb.exeC:\Windows\system32\aadtbcsb.exe52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1008 -
C:\Windows\SysWOW64\acluiaq.exeC:\Windows\system32\acluiaq.exe53⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\@AudioToastIcono.exeC:\Windows\system32\@AudioToastIcono.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:544 -
C:\Windows\SysWOW64\aadtbcc.exeC:\Windows\system32\aadtbcc.exe55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\SysWOW64\@EnrollmentToastIcondc.exeC:\Windows\system32\@EnrollmentToastIcondc.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2004
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
115KB
MD5a896c9cfa9bc88f8a1c7fcfab6a25e3d
SHA1e9157e41f987ed24fc2ca4b166e8fdc6b26dfe9b
SHA256e61e4603c6e79bd715819ad617f286ee65c4ab771e4b71d2f8c4a638bc53782c
SHA512df9d671e1c533ed68165141a1f9b09566a629f0ec7b306f54dc6b8560ebf75f56b4f3925079656493ff702e4aab2122fd2fce46615d00e65605cc3a9ad8c1ca8