Analysis
-
max time kernel
45s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
26-08-2024 05:12
Behavioral task
behavioral1
Sample
c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe
Resource
win7-20240708-en
windows7-x64
10 signatures
150 seconds
General
-
Target
c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe
-
Size
68KB
-
MD5
c259e839c3bf1643faad6755dbb4a45b
-
SHA1
75fd37e261d3c8d515a2744f40b5eadf9971b630
-
SHA256
0d5c5897275433b4daba75341d4d31f09c864704b24a285d61120b1f89fa5073
-
SHA512
d3e07764f1add49ba6a26c78e010e1ec2ce55e546b476ad88301f34fa5dc362769b755b80e3e7c7d3656495f7201a023074e1a61bad69e3957ae5e3ad39d0d28
-
SSDEEP
1536:CzX1z1RieG2bPWjjlAn+3hlG8aLIARvvoDNI6gDWgAee9YB/PvQ:CzX11IeG24C+3h/oIAR3MIVeOPvQ
Malware Config
Signatures
-
Blocklisted process makes network request 5 IoCs
flow pid Process 31 7744 Process not Found 35 7744 Process not Found 37 7744 Process not Found 39 7744 Process not Found 41 7744 Process not Found -
Executes dropped EXE 64 IoCs
pid Process 4976 EXPL0RER.EXE 2208 EXPL0RER.EXE 2884 EXPL0RER.EXE 3684 EXPL0RER.EXE 4864 EXPL0RER.EXE 2764 EXPL0RER.EXE 5044 EXPL0RER.EXE 4812 EXPL0RER.EXE 4344 EXPL0RER.EXE 1288 EXPL0RER.EXE 3116 EXPL0RER.EXE 2912 EXPL0RER.EXE 2512 EXPL0RER.EXE 744 EXPL0RER.EXE 4368 EXPL0RER.EXE 1144 EXPL0RER.EXE 4488 EXPL0RER.EXE 4244 EXPL0RER.EXE 3000 EXPL0RER.EXE 1628 EXPL0RER.EXE 4160 EXPL0RER.EXE 2400 EXPL0RER.EXE 2660 EXPL0RER.EXE 2948 EXPL0RER.EXE 2748 EXPL0RER.EXE 5108 EXPL0RER.EXE 4536 EXPL0RER.EXE 388 EXPL0RER.EXE 1228 EXPL0RER.EXE 2672 EXPL0RER.EXE 768 EXPL0RER.EXE 3232 EXPL0RER.EXE 3256 EXPL0RER.EXE 1068 EXPL0RER.EXE 2640 EXPL0RER.EXE 4588 EXPL0RER.EXE 4728 EXPL0RER.EXE 4788 EXPL0RER.EXE 5028 EXPL0RER.EXE 1732 EXPL0RER.EXE 3296 EXPL0RER.EXE 1020 EXPL0RER.EXE 3360 EXPL0RER.EXE 2968 EXPL0RER.EXE 5084 EXPL0RER.EXE 3764 EXPL0RER.EXE 4984 EXPL0RER.EXE 1032 EXPL0RER.EXE 3800 EXPL0RER.EXE 636 EXPL0RER.EXE 5000 EXPL0RER.EXE 1408 EXPL0RER.EXE 1412 EXPL0RER.EXE 1464 EXPL0RER.EXE 3556 EXPL0RER.EXE 3156 EXPL0RER.EXE 2268 EXPL0RER.EXE 1164 EXPL0RER.EXE 4544 EXPL0RER.EXE 1440 EXPL0RER.EXE 1260 EXPL0RER.EXE 1300 EXPL0RER.EXE 3100 EXPL0RER.EXE 4520 EXPL0RER.EXE -
Loads dropped DLL 64 IoCs
pid Process 3036 regsvr32.exe 2684 regsvr32.exe 804 regsvr32.exe 1628 regsvr32.exe 1628 regsvr32.exe 4160 regsvr32.exe 4160 regsvr32.exe 2676 regsvr32.exe 4644 regsvr32.exe 4644 regsvr32.exe 3176 regsvr32.exe 1748 regsvr32.exe 1748 regsvr32.exe 4624 regsvr32.exe 2096 regsvr32.exe 3100 regsvr32.exe 476 regsvr32.exe 3092 regsvr32.exe 952 regsvr32.exe 224 regsvr32.exe 2056 regsvr32.exe 4528 regsvr32.exe 2028 regsvr32.exe 2028 regsvr32.exe 4284 regsvr32.exe 4728 regsvr32.exe 2768 regsvr32.exe 2272 regsvr32.exe 2272 regsvr32.exe 2548 regsvr32.exe 2548 regsvr32.exe 3756 regsvr32.exe 3120 regsvr32.exe 888 regsvr32.exe 888 regsvr32.exe 3840 regsvr32.exe 2864 regsvr32.exe 2864 regsvr32.exe 2284 regsvr32.exe 2152 regsvr32.exe 3884 regsvr32.exe 3764 regsvr32.exe 5012 regsvr32.exe 2352 regsvr32.exe 3284 regsvr32.exe 1440 regsvr32.exe 4100 regsvr32.exe 892 regsvr32.exe 1524 regsvr32.exe 5092 regsvr32.exe 4080 regsvr32.exe 1568 regsvr32.exe 1568 regsvr32.exe 1552 regsvr32.exe 2152 regsvr32.exe 416 regsvr32.exe 2056 regsvr32.exe 2056 regsvr32.exe 420 regsvr32.exe 4932 regsvr32.exe 1440 regsvr32.exe 1440 regsvr32.exe 2808 regsvr32.exe 3120 regsvr32.exe -
resource yara_rule behavioral2/memory/4876-0-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/files/0x00090000000234d6-6.dat upx behavioral2/memory/4876-161-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3116-182-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4976-181-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2208-194-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2884-206-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3684-217-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4864-228-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2764-239-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5044-250-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4812-261-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4344-273-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1628-285-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1288-284-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3116-296-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2912-307-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2512-319-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/744-331-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4368-342-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1144-353-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4488-369-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4536-370-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4244-377-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3000-389-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1628-400-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4160-411-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2400-422-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2660-433-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2948-444-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2748-455-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5108-466-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4536-477-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/388-488-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1228-499-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2672-510-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/768-521-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3232-532-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3256-544-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1068-555-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2640-566-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4588-577-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4728-589-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4788-600-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5028-611-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1732-623-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3296-634-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1020-646-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3360-657-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2968-668-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5084-679-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3764-690-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/4984-701-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1032-712-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3800-723-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/636-734-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/5000-745-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1408-756-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1412-767-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1464-779-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3556-791-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/3156-802-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/2268-813-0x0000000000400000-0x0000000000433000-memory.dmp upx behavioral2/memory/1164-825-0x0000000000400000-0x0000000000433000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\$$336699.bat EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\SysModule64.DLL EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File created C:\Windows\SysWOW64\SysModule32.DLL EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXE EXPL0RER.EXE File created C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE File opened for modification C:\Windows\SysWOW64\EXPL0RER.EXEabc EXPL0RER.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File opened for modification C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE File created C:\Windows\MFCD3O.DLL EXPL0RER.EXE -
Program crash 64 IoCs
pid pid_target Process procid_target 14180 6292 Process not Found 447 14328 4348 Process not Found 449 13908 6668 Process not Found 451 14304 6836 Process not Found 453 13524 216 Process not Found 455 14184 7148 Process not Found 457 6824 6312 Process not Found 459 6156 6608 Process not Found 461 14328 6544 Process not Found 463 14312 688 Process not Found 465 14284 6304 Process not Found 467 14188 6536 Process not Found 471 13932 4256 Process not Found 473 14328 6280 Process not Found 477 7092 7132 Process not Found 479 14132 6612 Process not Found 483 6952 6444 Process not Found 485 6924 6148 Process not Found 487 13512 6948 Process not Found 489 14112 6276 Process not Found 491 13904 5228 Process not Found 495 13528 7048 Process not Found 497 14324 7196 Process not Found 499 13592 7276 Process not Found 501 13404 7500 Process not Found 507 14368 7576 Process not Found 509 14492 7660 Process not Found 511 14576 7752 Process not Found 514 14844 8100 Process not Found 522 14916 8184 Process not Found 524 15080 7420 Process not Found 530 15104 7572 Process not Found 533 15316 8096 Process not Found 545 7856 7220 Process not Found 550 13904 7396 Process not Found 553 2156 7892 Process not Found 561 14580 4356 Process not Found 583 7696 7536 Process not Found 588 15044 4744 Process not Found 592 14860 5044 Process not Found 597 15296 7828 Process not Found 600 15148 7324 Process not Found 606 15320 3348 Process not Found 618 14696 4372 Process not Found 629 8124 2684 Process not Found 633 15176 8340 Process not Found 651 15028 8644 Process not Found 661 14916 8832 Process not Found 665 14384 8216 Process not Found 676 1932 8692 Process not Found 686 14820 8944 Process not Found 694 15268 8636 Process not Found 705 15004 8880 Process not Found 708 15104 9076 Process not Found 724 8892 8760 Process not Found 721 14780 1732 Process not Found 737 15108 2256 Process not Found 748 3572 740 Process not Found 751 15264 416 Process not Found 763 3752 2072 Process not Found 770 15276 9416 Process not Found 782 8828 9664 Process not Found 789 14432 10088 Process not Found 802 15092 1180 Process not Found 809 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language regsvr32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EXPL0RER.EXE -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID\ = "SysModule64.classname" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid\ = "{081FE200-A103-11D7-A46D-C770E4459F2F}" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ProgID regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\Clsid regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ThreadingModel = "Apartment" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32\ = "C:\\Windows\\SysWow64\\SysModule64.DLL" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\SysModule64.classname\ = "hookmir" regsvr32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\InprocServer32 regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{081FE200-A103-11D7-A46D-C770E4459F2F}\ = "hookmir" regsvr32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4876 wrote to memory of 3036 4876 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 84 PID 4876 wrote to memory of 3036 4876 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 84 PID 4876 wrote to memory of 3036 4876 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 84 PID 4876 wrote to memory of 4976 4876 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 85 PID 4876 wrote to memory of 4976 4876 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 85 PID 4876 wrote to memory of 4976 4876 c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe 85 PID 4976 wrote to memory of 2684 4976 EXPL0RER.EXE 86 PID 4976 wrote to memory of 2684 4976 EXPL0RER.EXE 86 PID 4976 wrote to memory of 2684 4976 EXPL0RER.EXE 86 PID 4976 wrote to memory of 2208 4976 EXPL0RER.EXE 87 PID 4976 wrote to memory of 2208 4976 EXPL0RER.EXE 87 PID 4976 wrote to memory of 2208 4976 EXPL0RER.EXE 87 PID 2208 wrote to memory of 804 2208 EXPL0RER.EXE 89 PID 2208 wrote to memory of 804 2208 EXPL0RER.EXE 89 PID 2208 wrote to memory of 804 2208 EXPL0RER.EXE 89 PID 2208 wrote to memory of 2884 2208 EXPL0RER.EXE 90 PID 2208 wrote to memory of 2884 2208 EXPL0RER.EXE 90 PID 2208 wrote to memory of 2884 2208 EXPL0RER.EXE 90 PID 2884 wrote to memory of 1628 2884 EXPL0RER.EXE 91 PID 2884 wrote to memory of 1628 2884 EXPL0RER.EXE 91 PID 2884 wrote to memory of 1628 2884 EXPL0RER.EXE 91 PID 2884 wrote to memory of 3684 2884 EXPL0RER.EXE 92 PID 2884 wrote to memory of 3684 2884 EXPL0RER.EXE 92 PID 2884 wrote to memory of 3684 2884 EXPL0RER.EXE 92 PID 3684 wrote to memory of 4160 3684 EXPL0RER.EXE 93 PID 3684 wrote to memory of 4160 3684 EXPL0RER.EXE 93 PID 3684 wrote to memory of 4160 3684 EXPL0RER.EXE 93 PID 3684 wrote to memory of 4864 3684 EXPL0RER.EXE 94 PID 3684 wrote to memory of 4864 3684 EXPL0RER.EXE 94 PID 3684 wrote to memory of 4864 3684 EXPL0RER.EXE 94 PID 4864 wrote to memory of 2676 4864 EXPL0RER.EXE 95 PID 4864 wrote to memory of 2676 4864 EXPL0RER.EXE 95 PID 4864 wrote to memory of 2676 4864 EXPL0RER.EXE 95 PID 4864 wrote to memory of 2764 4864 EXPL0RER.EXE 96 PID 4864 wrote to memory of 2764 4864 EXPL0RER.EXE 96 PID 4864 wrote to memory of 2764 4864 EXPL0RER.EXE 96 PID 2764 wrote to memory of 4644 2764 EXPL0RER.EXE 97 PID 2764 wrote to memory of 4644 2764 EXPL0RER.EXE 97 PID 2764 wrote to memory of 4644 2764 EXPL0RER.EXE 97 PID 2764 wrote to memory of 5044 2764 EXPL0RER.EXE 98 PID 2764 wrote to memory of 5044 2764 EXPL0RER.EXE 98 PID 2764 wrote to memory of 5044 2764 EXPL0RER.EXE 98 PID 5044 wrote to memory of 3176 5044 EXPL0RER.EXE 100 PID 5044 wrote to memory of 3176 5044 EXPL0RER.EXE 100 PID 5044 wrote to memory of 3176 5044 EXPL0RER.EXE 100 PID 5044 wrote to memory of 4812 5044 EXPL0RER.EXE 101 PID 5044 wrote to memory of 4812 5044 EXPL0RER.EXE 101 PID 5044 wrote to memory of 4812 5044 EXPL0RER.EXE 101 PID 4812 wrote to memory of 1748 4812 EXPL0RER.EXE 102 PID 4812 wrote to memory of 1748 4812 EXPL0RER.EXE 102 PID 4812 wrote to memory of 1748 4812 EXPL0RER.EXE 102 PID 4812 wrote to memory of 4344 4812 EXPL0RER.EXE 103 PID 4812 wrote to memory of 4344 4812 EXPL0RER.EXE 103 PID 4812 wrote to memory of 4344 4812 EXPL0RER.EXE 103 PID 4344 wrote to memory of 4624 4344 EXPL0RER.EXE 105 PID 4344 wrote to memory of 4624 4344 EXPL0RER.EXE 105 PID 4344 wrote to memory of 4624 4344 EXPL0RER.EXE 105 PID 4344 wrote to memory of 1288 4344 EXPL0RER.EXE 106 PID 4344 wrote to memory of 1288 4344 EXPL0RER.EXE 106 PID 4344 wrote to memory of 1288 4344 EXPL0RER.EXE 106 PID 1288 wrote to memory of 2096 1288 EXPL0RER.EXE 107 PID 1288 wrote to memory of 2096 1288 EXPL0RER.EXE 107 PID 1288 wrote to memory of 2096 1288 EXPL0RER.EXE 107 PID 1288 wrote to memory of 3116 1288 EXPL0RER.EXE 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c259e839c3bf1643faad6755dbb4a45b_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4876 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL2⤵
- Loads dropped DLL
- Modifies registry class
PID:3036
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL3⤵
- Loads dropped DLL
PID:2684
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL4⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:804
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE4⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL5⤵
- Loads dropped DLL
PID:1628
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3684 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL6⤵
- Loads dropped DLL
PID:4160
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE6⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4864 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL7⤵
- Loads dropped DLL
PID:2676
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE7⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL8⤵
- Loads dropped DLL
PID:4644
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5044 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL9⤵
- Loads dropped DLL
PID:3176
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4812 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL10⤵
- Loads dropped DLL
PID:1748
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL11⤵
- Loads dropped DLL
PID:4624
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1288 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL12⤵
- Loads dropped DLL
- Modifies registry class
PID:2096
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE12⤵
- Executes dropped EXE
PID:3116 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL13⤵
- Loads dropped DLL
PID:3100
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE13⤵
- Executes dropped EXE
PID:2912 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL14⤵
- Loads dropped DLL
- Modifies registry class
PID:476
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE14⤵
- Executes dropped EXE
PID:2512 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL15⤵
- Loads dropped DLL
PID:3092
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE15⤵
- Executes dropped EXE
PID:744 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL16⤵
- Loads dropped DLL
PID:952
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE16⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL17⤵
- Loads dropped DLL
PID:224
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE17⤵
- Executes dropped EXE
PID:1144 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL18⤵
- Loads dropped DLL
PID:2056
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE18⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL19⤵
- Loads dropped DLL
PID:4528
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE19⤵
- Executes dropped EXE
PID:4244 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL20⤵
- Loads dropped DLL
PID:2028
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE20⤵
- Executes dropped EXE
PID:3000 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL21⤵
- Loads dropped DLL
PID:4284
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE21⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1628 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL22⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE22⤵
- Executes dropped EXE
PID:4160 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL23⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2768
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE23⤵
- Executes dropped EXE
PID:2400 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL24⤵
- Loads dropped DLL
PID:2272
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE24⤵
- Executes dropped EXE
PID:2660 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL25⤵
- Loads dropped DLL
- Modifies registry class
PID:2548
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE25⤵
- Executes dropped EXE
PID:2948 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL26⤵
- Loads dropped DLL
- Modifies registry class
PID:3756
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE26⤵
- Executes dropped EXE
PID:2748 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL27⤵
- Loads dropped DLL
PID:3120
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE27⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL28⤵
- Loads dropped DLL
PID:888
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4536 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL29⤵
- Loads dropped DLL
PID:3840
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:388 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL30⤵
- Loads dropped DLL
PID:2864
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE30⤵
- Executes dropped EXE
PID:1228 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL31⤵
- Loads dropped DLL
PID:2284
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE31⤵
- Executes dropped EXE
PID:2672 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL32⤵
- Loads dropped DLL
PID:2152
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE32⤵
- Executes dropped EXE
PID:768 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL33⤵
- Loads dropped DLL
PID:3884
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE33⤵
- Executes dropped EXE
PID:3232 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL34⤵
- Loads dropped DLL
PID:3764
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE34⤵
- Executes dropped EXE
PID:3256 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL35⤵
- Loads dropped DLL
PID:5012
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1068 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL36⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE36⤵
- Executes dropped EXE
PID:2640 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL37⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:3284
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE37⤵
- Executes dropped EXE
PID:4588 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL38⤵
- Loads dropped DLL
PID:1440
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE38⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL39⤵
- Loads dropped DLL
- Modifies registry class
PID:4100
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE39⤵
- Executes dropped EXE
PID:4788 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL40⤵
- Loads dropped DLL
- Modifies registry class
PID:892
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE40⤵
- Executes dropped EXE
PID:5028 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL41⤵
- Loads dropped DLL
PID:1524
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE41⤵
- Executes dropped EXE
PID:1732 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL42⤵
- Loads dropped DLL
PID:5092
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE42⤵
- Executes dropped EXE
PID:3296 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL43⤵
- Loads dropped DLL
- Modifies registry class
PID:4080
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE43⤵
- Executes dropped EXE
PID:1020 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL44⤵
- Loads dropped DLL
PID:1568
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE44⤵
- Executes dropped EXE
PID:3360 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL45⤵
- Loads dropped DLL
PID:1552
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE45⤵
- Executes dropped EXE
PID:2968 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL46⤵
- Loads dropped DLL
PID:2152
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE46⤵
- Executes dropped EXE
PID:5084 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL47⤵
- Loads dropped DLL
PID:416
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3764 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL48⤵
- Loads dropped DLL
PID:2056
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE48⤵
- Executes dropped EXE
PID:4984 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL49⤵
- Loads dropped DLL
PID:420
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE49⤵
- Executes dropped EXE
PID:1032 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL50⤵
- Loads dropped DLL
PID:4932
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE50⤵
- Executes dropped EXE
PID:3800 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL51⤵
- Loads dropped DLL
PID:1440
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE51⤵
- Executes dropped EXE
PID:636 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL52⤵
- Loads dropped DLL
PID:2808
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE52⤵
- Executes dropped EXE
PID:5000 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL53⤵
- Loads dropped DLL
PID:3120
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE53⤵
- Executes dropped EXE
PID:1408 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL54⤵PID:888
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE54⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1412 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL55⤵PID:2180
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE55⤵
- Executes dropped EXE
PID:1464 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL56⤵PID:4848
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE56⤵
- Executes dropped EXE
PID:3556 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL57⤵PID:2040
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE57⤵
- Executes dropped EXE
PID:3156 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL58⤵PID:3696
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE58⤵
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL59⤵
- System Location Discovery: System Language Discovery
PID:4988
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE59⤵
- Executes dropped EXE
PID:1164 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL60⤵PID:1352
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE60⤵
- Executes dropped EXE
PID:4544 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL61⤵PID:4076
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE61⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1440 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL62⤵PID:2808
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1260 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL63⤵PID:3008
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE63⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL64⤵PID:988
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE64⤵
- Executes dropped EXE
PID:3100 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL65⤵
- System Location Discovery: System Language Discovery
PID:644
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE65⤵
- Executes dropped EXE
PID:4520 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL66⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE66⤵PID:2348
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL67⤵PID:3284
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE67⤵PID:1488
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL68⤵PID:4408
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE68⤵PID:2548
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL69⤵PID:1524
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE69⤵
- Drops file in System32 directory
PID:404 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL70⤵PID:2540
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE70⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:64 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL71⤵
- Modifies registry class
PID:952
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE71⤵PID:2152
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL72⤵PID:5008
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE72⤵
- Drops file in System32 directory
PID:3916 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL73⤵
- Modifies registry class
PID:1204
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE73⤵PID:4164
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL74⤵PID:2960
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE74⤵PID:4408
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL75⤵PID:1716
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE75⤵PID:3816
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL76⤵PID:4388
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE76⤵
- Drops file in System32 directory
PID:2608 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL77⤵PID:4704
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE77⤵PID:3548
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL78⤵
- Modifies registry class
PID:3196
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE78⤵PID:2648
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL79⤵PID:3588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE79⤵PID:1340
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL80⤵
- Modifies registry class
PID:952
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE80⤵PID:4616
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL81⤵PID:4256
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE81⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5008 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL82⤵PID:4600
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE82⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:3248 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL83⤵PID:2540
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE83⤵PID:5016
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL84⤵PID:444
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE84⤵
- Drops file in Windows directory
PID:1356 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL85⤵PID:3588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE85⤵PID:3092
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL86⤵PID:952
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE86⤵
- Drops file in Windows directory
PID:3756 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL87⤵PID:3588
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE87⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4284 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL88⤵PID:4780
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE88⤵
- Drops file in Windows directory
PID:3120 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL89⤵PID:4828
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE89⤵PID:3884
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL90⤵PID:216
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE90⤵
- System Location Discovery: System Language Discovery
PID:524 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL91⤵PID:4296
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE91⤵PID:1604
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL92⤵PID:2396
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE92⤵
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL93⤵
- System Location Discovery: System Language Discovery
PID:4780
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE93⤵
- Drops file in System32 directory
- Drops file in Windows directory
PID:5128 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL94⤵PID:5196
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE94⤵PID:5244
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL95⤵PID:5344
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE95⤵
- System Location Discovery: System Language Discovery
PID:5368 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL96⤵PID:5440
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE96⤵PID:5452
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL97⤵PID:5524
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE97⤵PID:5544
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL98⤵PID:5608
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE98⤵PID:5624
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL99⤵PID:5696
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE99⤵
- Drops file in System32 directory
PID:5712 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL100⤵
- Modifies registry class
PID:5776
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE100⤵PID:5792
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL101⤵PID:5860
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE101⤵PID:5876
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL102⤵
- Modifies registry class
PID:5948
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE102⤵
- System Location Discovery: System Language Discovery
PID:5964 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL103⤵
- Modifies registry class
PID:6040
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE103⤵PID:6056
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL104⤵
- Modifies registry class
PID:6128
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE104⤵PID:3324
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL105⤵PID:5224
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE105⤵
- Drops file in Windows directory
PID:5252 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL106⤵PID:2708
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE106⤵PID:5408
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL107⤵PID:5500
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE107⤵PID:5512
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL108⤵PID:5604
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE108⤵PID:5632
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL109⤵
- Modifies registry class
PID:5704
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE109⤵
- Drops file in System32 directory
PID:5720 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL110⤵PID:5784
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE110⤵PID:5808
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL111⤵PID:5884
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE111⤵PID:5912
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL112⤵PID:5992
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE112⤵PID:6052
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL113⤵PID:6120
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE113⤵PID:6140
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL114⤵PID:5216
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE114⤵
- Drops file in System32 directory
PID:5300 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL115⤵PID:5404
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE115⤵PID:5436
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL116⤵
- Modifies registry class
PID:5552
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE116⤵
- Drops file in Windows directory
PID:5500 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL117⤵PID:5676
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE117⤵
- Drops file in System32 directory
PID:5692 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL118⤵
- Modifies registry class
PID:5704
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE118⤵
- Drops file in Windows directory
PID:5824 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL119⤵
- Modifies registry class
PID:5916
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE119⤵PID:5884
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL120⤵PID:6092
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE120⤵
- Drops file in System32 directory
PID:6108 -
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL121⤵PID:5180
-
-
C:\Windows\SysWOW64\EXPL0RER.EXEC:\Windows\system32\EXPL0RER.EXE121⤵PID:5200
-
C:\Windows\SysWOW64\regsvr32.exeregsvr32.exe /s C:\Windows\system32\SysModule64.DLL122⤵PID:5400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-