Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
124s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 19:32
Behavioral task
behavioral1
Sample
a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe
Resource
win7-20240705-en
General
-
Target
a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe
-
Size
81KB
-
MD5
a7eed18c21897e50bbe167b8f438b9af
-
SHA1
e2dec9aa656feee9a89d0e62fc467b4bab66fe4c
-
SHA256
6115358233527733f29ee9ce90c90c12a4ed470b3e07d7ff7e286b974292ed3b
-
SHA512
dffc93cf3a16712e28c6651fb62333c22fd5e87cf5b2d8d910b7d92f661db1f7baac03f7d78d5a62c22f5019a364a1735187a422228f3faf87ece9f8eeb6dc59
-
SSDEEP
1536:Ue1QGvzacMmHor4Vp6VL/yja4wyYTC6byck+ONb:UaQuyk0VL6ks+Ot
Malware Config
Signatures
-
Executes dropped EXE 43 IoCs
pid Process 1344 svchostwin.exe 2248 svchostwin.exe 1392 svchostwin.exe 3000 svchostwin.exe 4624 svchostwin.exe 1152 svchostwin.exe 652 svchostwin.exe 780 svchostwin.exe 4192 svchostwin.exe 5060 svchostwin.exe 3736 svchostwin.exe 4528 svchostwin.exe 2484 svchostwin.exe 4660 svchostwin.exe 4992 svchostwin.exe 2592 svchostwin.exe 1436 svchostwin.exe 1188 svchostwin.exe 3224 svchostwin.exe 692 svchostwin.exe 4240 svchostwin.exe 4044 svchostwin.exe 3648 svchostwin.exe 1020 svchostwin.exe 4684 svchostwin.exe 996 svchostwin.exe 684 svchostwin.exe 1552 svchostwin.exe 3928 svchostwin.exe 2632 svchostwin.exe 5028 svchostwin.exe 1856 svchostwin.exe 1156 svchostwin.exe 3308 svchostwin.exe 3388 svchostwin.exe 4708 svchostwin.exe 1860 svchostwin.exe 624 svchostwin.exe 3612 svchostwin.exe 1988 svchostwin.exe 2804 svchostwin.exe 2188 svchostwin.exe 2624 svchostwin.exe -
resource yara_rule behavioral2/memory/3816-0-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/files/0x0007000000023430-3.dat upx behavioral2/memory/5060-15-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3816-14-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1344-17-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2248-19-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1392-21-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3000-23-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4624-25-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1152-27-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/652-29-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/780-31-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4192-33-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/692-36-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/5060-35-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3736-38-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4528-40-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3648-43-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2484-42-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4660-45-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4992-47-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2592-49-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1436-51-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1188-53-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3224-55-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/692-57-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4240-59-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4044-61-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3648-63-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1020-65-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4684-67-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/996-69-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/684-71-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1552-73-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3928-75-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2632-77-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/5028-79-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1856-81-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1156-83-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2624-85-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1988-91-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3612-93-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/624-95-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/5028-109-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2248-167-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3816-171-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1344-169-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1392-165-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3000-163-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4624-161-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1152-159-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/652-157-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/780-155-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4192-153-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/5060-151-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3736-149-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4528-147-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2484-145-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4660-143-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/4992-141-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/2592-139-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1436-137-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/1188-135-0x0000000000400000-0x0000000000481000-memory.dmp upx behavioral2/memory/3224-133-0x0000000000400000-0x0000000000481000-memory.dmp upx -
Drops file in System32 directory 2 IoCs
description ioc Process File created \??\c:\windows\SysWOW64\svchostwin.exe a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe File opened for modification \??\c:\windows\SysWOW64\svchostwin.exe a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe -
System Location Discovery: System Language Discovery 1 TTPs 43 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchostwin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3816 wrote to memory of 1344 3816 a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe 84 PID 3816 wrote to memory of 1344 3816 a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe 84 PID 3816 wrote to memory of 1344 3816 a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe 84 PID 1344 wrote to memory of 2248 1344 svchostwin.exe 86 PID 1344 wrote to memory of 2248 1344 svchostwin.exe 86 PID 1344 wrote to memory of 2248 1344 svchostwin.exe 86 PID 2248 wrote to memory of 1392 2248 svchostwin.exe 87 PID 2248 wrote to memory of 1392 2248 svchostwin.exe 87 PID 2248 wrote to memory of 1392 2248 svchostwin.exe 87 PID 1392 wrote to memory of 3000 1392 svchostwin.exe 89 PID 1392 wrote to memory of 3000 1392 svchostwin.exe 89 PID 1392 wrote to memory of 3000 1392 svchostwin.exe 89 PID 3000 wrote to memory of 4624 3000 svchostwin.exe 90 PID 3000 wrote to memory of 4624 3000 svchostwin.exe 90 PID 3000 wrote to memory of 4624 3000 svchostwin.exe 90 PID 4624 wrote to memory of 1152 4624 svchostwin.exe 92 PID 4624 wrote to memory of 1152 4624 svchostwin.exe 92 PID 4624 wrote to memory of 1152 4624 svchostwin.exe 92 PID 1152 wrote to memory of 652 1152 svchostwin.exe 93 PID 1152 wrote to memory of 652 1152 svchostwin.exe 93 PID 1152 wrote to memory of 652 1152 svchostwin.exe 93 PID 652 wrote to memory of 780 652 svchostwin.exe 94 PID 652 wrote to memory of 780 652 svchostwin.exe 94 PID 652 wrote to memory of 780 652 svchostwin.exe 94 PID 780 wrote to memory of 4192 780 svchostwin.exe 95 PID 780 wrote to memory of 4192 780 svchostwin.exe 95 PID 780 wrote to memory of 4192 780 svchostwin.exe 95 PID 4192 wrote to memory of 5060 4192 svchostwin.exe 96 PID 4192 wrote to memory of 5060 4192 svchostwin.exe 96 PID 4192 wrote to memory of 5060 4192 svchostwin.exe 96 PID 5060 wrote to memory of 3736 5060 svchostwin.exe 97 PID 5060 wrote to memory of 3736 5060 svchostwin.exe 97 PID 5060 wrote to memory of 3736 5060 svchostwin.exe 97 PID 3736 wrote to memory of 4528 3736 svchostwin.exe 98 PID 3736 wrote to memory of 4528 3736 svchostwin.exe 98 PID 3736 wrote to memory of 4528 3736 svchostwin.exe 98 PID 4528 wrote to memory of 2484 4528 svchostwin.exe 99 PID 4528 wrote to memory of 2484 4528 svchostwin.exe 99 PID 4528 wrote to memory of 2484 4528 svchostwin.exe 99 PID 2484 wrote to memory of 4660 2484 svchostwin.exe 100 PID 2484 wrote to memory of 4660 2484 svchostwin.exe 100 PID 2484 wrote to memory of 4660 2484 svchostwin.exe 100 PID 4660 wrote to memory of 4992 4660 svchostwin.exe 101 PID 4660 wrote to memory of 4992 4660 svchostwin.exe 101 PID 4660 wrote to memory of 4992 4660 svchostwin.exe 101 PID 4992 wrote to memory of 2592 4992 svchostwin.exe 102 PID 4992 wrote to memory of 2592 4992 svchostwin.exe 102 PID 4992 wrote to memory of 2592 4992 svchostwin.exe 102 PID 2592 wrote to memory of 1436 2592 svchostwin.exe 103 PID 2592 wrote to memory of 1436 2592 svchostwin.exe 103 PID 2592 wrote to memory of 1436 2592 svchostwin.exe 103 PID 1436 wrote to memory of 1188 1436 svchostwin.exe 104 PID 1436 wrote to memory of 1188 1436 svchostwin.exe 104 PID 1436 wrote to memory of 1188 1436 svchostwin.exe 104 PID 1188 wrote to memory of 3224 1188 svchostwin.exe 105 PID 1188 wrote to memory of 3224 1188 svchostwin.exe 105 PID 1188 wrote to memory of 3224 1188 svchostwin.exe 105 PID 3224 wrote to memory of 692 3224 svchostwin.exe 107 PID 3224 wrote to memory of 692 3224 svchostwin.exe 107 PID 3224 wrote to memory of 692 3224 svchostwin.exe 107 PID 692 wrote to memory of 4240 692 svchostwin.exe 108 PID 692 wrote to memory of 4240 692 svchostwin.exe 108 PID 692 wrote to memory of 4240 692 svchostwin.exe 108 PID 4240 wrote to memory of 4044 4240 svchostwin.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a7eed18c21897e50bbe167b8f438b9af_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3816 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1344 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2248 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1392 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:652 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:780 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 110⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4192 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 111⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5060 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 112⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 113⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4528 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 114⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2484 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 115⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4660 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 116⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4992 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 117⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 118⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1436 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 119⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1188 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 120⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3224 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 121⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:692 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 122⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 123⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4044 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 124⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3648 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 125⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1020 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 126⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4684 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 127⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:996 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 128⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:684 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 129⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1552 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 130⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3928 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 131⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2632 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 132⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 133⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1856 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 134⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1156 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 135⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3308 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 136⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3388 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 137⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4708 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 138⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1860 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 139⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:624 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 140⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3612 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 141⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1988 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 142⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2804 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 143⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2188 -
\??\c:\windows\SysWOW64\svchostwin.exec:\windows\system32\svchostwin.exe 144⤵
- Executes dropped EXE
PID:2624
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5a7eed18c21897e50bbe167b8f438b9af
SHA1e2dec9aa656feee9a89d0e62fc467b4bab66fe4c
SHA2566115358233527733f29ee9ce90c90c12a4ed470b3e07d7ff7e286b974292ed3b
SHA512dffc93cf3a16712e28c6651fb62333c22fd5e87cf5b2d8d910b7d92f661db1f7baac03f7d78d5a62c22f5019a364a1735187a422228f3faf87ece9f8eeb6dc59