Analysis
-
max time kernel
132s -
max time network
130s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 13:26
Static task
static1
Behavioral task
behavioral1
Sample
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe
-
Size
705KB
-
MD5
c515a556d7cc1fb7a476fb0fb1aadaaa
-
SHA1
c5690d2abee36e06c2c40dceba693bc7eeeda7be
-
SHA256
4ba67a000526a4abcf098ab1671fae28996f0db56a67bdeb36d2ef653e34c35b
-
SHA512
ceb6047816345ad1767698982d448d48accc1e9b22f0fb7ca9c9233444523531b9ef672041dc73ce6a6b6f22fd7263ca882d6fb19288d0dd726cb7c0eb94a1a2
-
SSDEEP
12288:0J0unggMGIwHJo8spfSPFWHw2Y8ZKk8mZfurZB+n3mfYBkU4f5YNmmh8o:luoG9priSPFWHw2Y8ZK5d22fYBkU4f5q
Malware Config
Extracted
Protocol: smtp- Host:
smtp.gmail.com - Port:
587 - Username:
[email protected] - Password:
yoqmiiwhxyjcorck
Extracted
netwire
greatking.freeddns.org:3362
-
activex_autorun
false
-
copy_executable
true
-
delete_original
false
-
host_id
HostId-%Rand%
-
install_path
%AppData%\Install\Host.exe
-
keylogger_dir
%AppData%\Logs\
-
lock_executable
false
-
offline_keylogger
true
-
password
Password
-
registry_autorun
true
-
startup_name
NetWire
-
use_mutex
false
Signatures
-
NetWire RAT payload 7 IoCs
Processes:
resource yara_rule behavioral2/memory/2636-39-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral2/memory/4988-95-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral2/memory/456-134-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral2/memory/4368-212-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral2/memory/440-246-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral2/memory/3092-554-0x0000000000400000-0x0000000000423000-memory.dmp netwire behavioral2/memory/5072-581-0x0000000000400000-0x0000000000423000-memory.dmp netwire -
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Detected Nirsoft tools 3 IoCs
Free utilities often used by attackers which can steal passwords, product keys, etc.
Processes:
resource yara_rule behavioral2/memory/884-271-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/884-272-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft behavioral2/memory/884-274-0x0000000000400000-0x000000000041C000-memory.dmp Nirsoft -
NirSoft MailPassView 3 IoCs
Password recovery tool for various email clients
Processes:
resource yara_rule behavioral2/memory/884-271-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/884-272-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView behavioral2/memory/884-274-0x0000000000400000-0x000000000041C000-memory.dmp MailPassView -
Blocklisted process makes network request 4 IoCs
Processes:
flow pid Process 176 4900 241 1452 242 1452 243 1452 -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
App.exeApp.exeApp.exeHost.exeApp.exeApp.exeHost.exeApp.exeHost.exeHost.exec515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exeHost.exeApp.exeHost.exeApp.exeApp.exeHost.exeApp.exeApp.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeHost.exeApp.exeHost.exeHost.exeHost.exeApp.exeHost.exeApp.execoded.exeHost.exeHost.exeHost.exeHost.exeHost.exeApp.exeApp.exeHost.exeApp.exeHost.exeApp.exeApp.exeHost.exeHost.exeHost.exeHost.exeHost.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation coded.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation App.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe Key value queried \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Control Panel\International\Geo\Nation Host.exe -
Executes dropped EXE 64 IoCs
Processes:
coded.exeApp.execoded.exeApp.exeHost.exeWindows Update.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeApp.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.execoded.exeApp.execoded.exeApp.exeHost.exepid Process 3648 coded.exe 2220 App.exe 232 coded.exe 2636 App.exe 4924 Host.exe 3100 Windows Update.exe 440 coded.exe 2128 App.exe 4776 coded.exe 4988 App.exe 4532 Host.exe 3688 coded.exe 1360 App.exe 3264 coded.exe 456 App.exe 628 Host.exe 1028 coded.exe 1560 App.exe 2244 coded.exe 464 App.exe 1000 Host.exe 3484 coded.exe 3312 App.exe 4276 coded.exe 4368 App.exe 2700 Host.exe 1360 coded.exe 2220 App.exe 4968 coded.exe 4712 App.exe 4060 App.exe 440 App.exe 5040 Host.exe 3472 coded.exe 4056 App.exe 4776 coded.exe 1792 App.exe 2008 Host.exe 4528 coded.exe 2152 App.exe 4824 coded.exe 3596 App.exe 3592 App.exe 4900 Host.exe 2420 coded.exe 2220 App.exe 4296 coded.exe 3484 App.exe 1824 Host.exe 5016 coded.exe 4592 App.exe 4924 coded.exe 3356 App.exe 3516 Host.exe 2156 coded.exe 2916 App.exe 3564 coded.exe 1848 App.exe 8 Host.exe 1640 coded.exe 440 App.exe 3548 coded.exe 3244 App.exe 3872 Host.exe -
Processes:
resource yara_rule behavioral2/memory/2636-36-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2636-38-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/2636-39-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4988-95-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4988-94-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/456-134-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4368-212-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/4368-211-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/440-246-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/440-245-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3092-553-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/3092-554-0x0000000000400000-0x0000000000423000-memory.dmp upx behavioral2/memory/5072-581-0x0000000000400000-0x0000000000423000-memory.dmp upx -
Uses the VBS compiler for execution 1 TTPs
-
Accesses Microsoft Outlook accounts 1 TTPs 1 IoCs
Processes:
vbc.exedescription ioc Process Key opened \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts vbc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Windows Update.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1194130065-3471212556-1656947724-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update = "C:\\Users\\Admin\\AppData\\Roaming\\WindowsUpdate.exe" Windows Update.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 11 checkip.dyndns.org -
Suspicious use of SetThreadContext 64 IoCs
Processes:
App.exeApp.exeApp.exeApp.exeApp.exeApp.exeWindows Update.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exeApp.exedescription pid Process procid_target PID 2220 set thread context of 2636 2220 App.exe 98 PID 2128 set thread context of 4988 2128 App.exe 112 PID 1360 set thread context of 456 1360 App.exe 125 PID 1560 set thread context of 464 1560 App.exe 138 PID 3312 set thread context of 4368 3312 App.exe 152 PID 2220 set thread context of 440 2220 App.exe 167 PID 3100 set thread context of 884 3100 Windows Update.exe 180 PID 4056 set thread context of 1792 4056 App.exe 181 PID 2152 set thread context of 3592 2152 App.exe 195 PID 2220 set thread context of 3484 2220 App.exe 208 PID 4592 set thread context of 3356 4592 App.exe 221 PID 2916 set thread context of 1848 2916 App.exe 234 PID 440 set thread context of 3244 440 App.exe 337 PID 1824 set thread context of 4768 1824 App.exe 261 PID 4804 set thread context of 3532 4804 App.exe 276 PID 4528 set thread context of 2156 4528 App.exe 290 PID 5072 set thread context of 936 5072 App.exe 304 PID 3100 set thread context of 4040 3100 Windows Update.exe 310 PID 4448 set thread context of 3092 4448 App.exe 318 PID 3296 set thread context of 5072 3296 App.exe 332 PID 3244 set thread context of 2432 3244 App.exe 345 PID 4944 set thread context of 1700 4944 App.exe 362 PID 4460 set thread context of 4936 4460 App.exe 444 PID 1400 set thread context of 2004 1400 App.exe 391 PID 4508 set thread context of 2320 4508 App.exe 404 PID 388 set thread context of 4732 388 App.exe 501 PID 3000 set thread context of 1584 3000 App.exe 430 PID 2456 set thread context of 4936 2456 App.exe 444 PID 3320 set thread context of 4356 3320 App.exe 457 PID 4512 set thread context of 2548 4512 App.exe 470 PID 4532 set thread context of 3460 4532 App.exe 485 PID 4944 set thread context of 1868 4944 App.exe 552 PID 232 set thread context of 4128 232 App.exe 511 PID 3144 set thread context of 4288 3144 App.exe 524 PID 3420 set thread context of 60 3420 App.exe 594 PID 3008 set thread context of 4492 3008 App.exe 550 PID 3548 set thread context of 4464 3548 App.exe 563 PID 3568 set thread context of 1608 3568 App.exe 661 PID 3992 set thread context of 1400 3992 App.exe 649 PID 3460 set thread context of 1896 3460 App.exe 606 PID 464 set thread context of 3896 464 App.exe 619 PID 1348 set thread context of 3864 1348 App.exe 634 PID 812 set thread context of 3312 812 App.exe 647 PID 880 set thread context of 1348 880 App.exe 688 PID 3568 set thread context of 4368 3568 App.exe 673 PID 2060 set thread context of 4048 2060 App.exe 743 PID 1680 set thread context of 4684 1680 App.exe 756 PID 2380 set thread context of 232 2380 App.exe 713 PID 1828 set thread context of 1636 1828 App.exe 726 PID 1104 set thread context of 716 1104 App.exe 739 PID 4544 set thread context of 3424 4544 App.exe 752 PID 3680 set thread context of 2720 3680 App.exe 765 PID 3916 set thread context of 1504 3916 App.exe 779 PID 3968 set thread context of 3748 3968 App.exe 823 PID 2436 set thread context of 4768 2436 App.exe 836 PID 3564 set thread context of 5116 3564 App.exe 819 PID 3928 set thread context of 3544 3928 App.exe 832 PID 2824 set thread context of 5040 2824 App.exe 846 PID 3968 set thread context of 4828 3968 App.exe 860 PID 4612 set thread context of 1152 4612 App.exe 873 PID 448 set thread context of 3484 448 App.exe 886 PID 2604 set thread context of 4756 2604 App.exe 899 PID 3104 set thread context of 4556 3104 App.exe 980 PID 4312 set thread context of 692 4312 App.exe 925 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
cmd.exeApp.execmd.execoded.execmd.execoded.exeApp.exeApp.execmd.execmd.execoded.execoded.exeschtasks.exeschtasks.exeschtasks.execmd.exeApp.execoded.execmd.execmd.exeschtasks.execmd.exeHost.exeschtasks.execmd.exeApp.execmd.exeHost.exeschtasks.exeschtasks.execoded.exeHost.execmd.exeschtasks.exeApp.execoded.execmd.execmd.execmd.exeApp.exeHost.exeschtasks.exeApp.exeschtasks.exeApp.execmd.exeApp.exeschtasks.execmd.exeApp.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language coded.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Host.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language App.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 64 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid Process 4328 760 schtasks.exe 3264 schtasks.exe 4616 schtasks.exe 1912 schtasks.exe 4256 schtasks.exe 3808 schtasks.exe 2320 schtasks.exe 1688 schtasks.exe 2264 2432 4712 schtasks.exe 4796 schtasks.exe 4132 schtasks.exe 432 schtasks.exe 3680 schtasks.exe 4900 schtasks.exe 1100 schtasks.exe 3908 schtasks.exe 4520 schtasks.exe 464 schtasks.exe 4692 schtasks.exe 2668 5068 1000 schtasks.exe 4928 schtasks.exe 4732 schtasks.exe 1096 3488 schtasks.exe 1920 schtasks.exe 1176 5092 schtasks.exe 4868 schtasks.exe 4520 schtasks.exe 2208 schtasks.exe 4328 3612 schtasks.exe 1884 schtasks.exe 2368 1000 3692 716 schtasks.exe 3752 2380 2592 schtasks.exe 3968 schtasks.exe 3684 schtasks.exe 1848 schtasks.exe 2840 schtasks.exe 4736 schtasks.exe 2592 schtasks.exe 2380 4944 schtasks.exe 3312 schtasks.exe 740 schtasks.exe 1164 schtasks.exe 3180 3240 464 schtasks.exe 2432 schtasks.exe 5116 schtasks.exe 4036 schtasks.exe 4836 3312 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exepid Process 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 2220 App.exe 2220 App.exe 4924 Host.exe 4924 Host.exe 2128 App.exe 2128 App.exe 4532 Host.exe 4532 Host.exe 1360 App.exe 1360 App.exe 628 Host.exe 628 Host.exe 1560 App.exe 1560 App.exe 1000 Host.exe 1000 Host.exe 3312 App.exe 3312 App.exe 2700 Host.exe 2700 Host.exe 2220 App.exe 2220 App.exe 5040 Host.exe 5040 Host.exe 4056 App.exe 4056 App.exe 2008 Host.exe 2008 Host.exe 2152 App.exe 2152 App.exe 4900 Host.exe 4900 Host.exe 2220 App.exe 2220 App.exe 1824 Host.exe 1824 Host.exe 4592 App.exe 4592 App.exe 3516 Host.exe 3516 Host.exe 2916 App.exe 2916 App.exe 8 Host.exe 8 Host.exe 440 App.exe 440 App.exe 3872 Host.exe 3872 Host.exe 1824 App.exe 1824 App.exe 4468 Host.exe 4468 Host.exe 4804 App.exe 4804 App.exe 5116 Host.exe 5116 Host.exe 4528 App.exe 4528 App.exe 3928 Host.exe 3928 Host.exe 5072 App.exe 5072 App.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeWindows Update.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exeApp.exeHost.exedescription pid Process Token: SeDebugPrivilege 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe Token: SeDebugPrivilege 2220 App.exe Token: SeDebugPrivilege 4924 Host.exe Token: SeDebugPrivilege 2128 App.exe Token: SeDebugPrivilege 4532 Host.exe Token: SeDebugPrivilege 1360 App.exe Token: SeDebugPrivilege 628 Host.exe Token: SeDebugPrivilege 1560 App.exe Token: SeDebugPrivilege 1000 Host.exe Token: SeDebugPrivilege 3100 Windows Update.exe Token: SeDebugPrivilege 3312 App.exe Token: SeDebugPrivilege 2700 Host.exe Token: SeDebugPrivilege 2220 App.exe Token: SeDebugPrivilege 5040 Host.exe Token: SeDebugPrivilege 4056 App.exe Token: SeDebugPrivilege 2008 Host.exe Token: SeDebugPrivilege 2152 App.exe Token: SeDebugPrivilege 4900 Host.exe Token: SeDebugPrivilege 2220 App.exe Token: SeDebugPrivilege 1824 Host.exe Token: SeDebugPrivilege 4592 App.exe Token: SeDebugPrivilege 3516 Host.exe Token: SeDebugPrivilege 2916 App.exe Token: SeDebugPrivilege 8 Host.exe Token: SeDebugPrivilege 440 App.exe Token: SeDebugPrivilege 3872 Host.exe Token: SeDebugPrivilege 1824 App.exe Token: SeDebugPrivilege 4468 Host.exe Token: SeDebugPrivilege 4804 App.exe Token: SeDebugPrivilege 5116 Host.exe Token: SeDebugPrivilege 4528 App.exe Token: SeDebugPrivilege 3928 Host.exe Token: SeDebugPrivilege 5072 App.exe Token: SeDebugPrivilege 3952 Host.exe Token: SeDebugPrivilege 4448 App.exe Token: SeDebugPrivilege 824 Host.exe Token: SeDebugPrivilege 3296 App.exe Token: SeDebugPrivilege 2676 Host.exe Token: SeDebugPrivilege 3244 App.exe Token: SeDebugPrivilege 1480 Host.exe Token: SeDebugPrivilege 4944 App.exe Token: SeDebugPrivilege 5028 Host.exe Token: SeDebugPrivilege 4460 App.exe Token: SeDebugPrivilege 5056 Host.exe Token: SeDebugPrivilege 1400 App.exe Token: SeDebugPrivilege 412 Host.exe Token: SeDebugPrivilege 4508 App.exe Token: SeDebugPrivilege 4936 Host.exe Token: SeDebugPrivilege 388 App.exe Token: SeDebugPrivilege 3864 Host.exe Token: SeDebugPrivilege 3000 App.exe Token: SeDebugPrivilege 2992 Host.exe Token: SeDebugPrivilege 2456 App.exe Token: SeDebugPrivilege 1400 Host.exe Token: SeDebugPrivilege 3320 App.exe Token: SeDebugPrivilege 3236 Host.exe Token: SeDebugPrivilege 4512 App.exe Token: SeDebugPrivilege 2208 Host.exe Token: SeDebugPrivilege 4532 App.exe Token: SeDebugPrivilege 1680 Host.exe Token: SeDebugPrivilege 4944 App.exe Token: SeDebugPrivilege 3728 Host.exe Token: SeDebugPrivilege 232 App.exe Token: SeDebugPrivilege 4924 Host.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
Windows Update.exepid Process 3100 Windows Update.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.execmd.exeApp.execmd.execmd.exeApp.execoded.exeHost.execmd.exeApp.execmd.execmd.exedescription pid Process procid_target PID 3536 wrote to memory of 3648 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 87 PID 3536 wrote to memory of 3648 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 87 PID 3536 wrote to memory of 3648 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 87 PID 3536 wrote to memory of 2712 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 88 PID 3536 wrote to memory of 2712 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 88 PID 3536 wrote to memory of 2712 3536 c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe 88 PID 2712 wrote to memory of 2220 2712 cmd.exe 90 PID 2712 wrote to memory of 2220 2712 cmd.exe 90 PID 2712 wrote to memory of 2220 2712 cmd.exe 90 PID 2220 wrote to memory of 232 2220 App.exe 91 PID 2220 wrote to memory of 232 2220 App.exe 91 PID 2220 wrote to memory of 232 2220 App.exe 91 PID 2220 wrote to memory of 4396 2220 App.exe 92 PID 2220 wrote to memory of 4396 2220 App.exe 92 PID 2220 wrote to memory of 4396 2220 App.exe 92 PID 4396 wrote to memory of 4044 4396 cmd.exe 94 PID 4396 wrote to memory of 4044 4396 cmd.exe 94 PID 4396 wrote to memory of 4044 4396 cmd.exe 94 PID 2220 wrote to memory of 32 2220 App.exe 95 PID 2220 wrote to memory of 32 2220 App.exe 95 PID 2220 wrote to memory of 32 2220 App.exe 95 PID 32 wrote to memory of 3908 32 cmd.exe 97 PID 32 wrote to memory of 3908 32 cmd.exe 97 PID 32 wrote to memory of 3908 32 cmd.exe 97 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2220 wrote to memory of 2636 2220 App.exe 98 PID 2636 wrote to memory of 4924 2636 App.exe 99 PID 2636 wrote to memory of 4924 2636 App.exe 99 PID 2636 wrote to memory of 4924 2636 App.exe 99 PID 3648 wrote to memory of 3100 3648 coded.exe 100 PID 3648 wrote to memory of 3100 3648 coded.exe 100 PID 3648 wrote to memory of 3100 3648 coded.exe 100 PID 4924 wrote to memory of 440 4924 Host.exe 135 PID 4924 wrote to memory of 440 4924 Host.exe 135 PID 4924 wrote to memory of 440 4924 Host.exe 135 PID 4924 wrote to memory of 3600 4924 Host.exe 102 PID 4924 wrote to memory of 3600 4924 Host.exe 102 PID 4924 wrote to memory of 3600 4924 Host.exe 102 PID 3600 wrote to memory of 2128 3600 cmd.exe 104 PID 3600 wrote to memory of 2128 3600 cmd.exe 104 PID 3600 wrote to memory of 2128 3600 cmd.exe 104 PID 2128 wrote to memory of 4776 2128 App.exe 105 PID 2128 wrote to memory of 4776 2128 App.exe 105 PID 2128 wrote to memory of 4776 2128 App.exe 105 PID 2128 wrote to memory of 3992 2128 App.exe 106 PID 2128 wrote to memory of 3992 2128 App.exe 106 PID 2128 wrote to memory of 3992 2128 App.exe 106 PID 3992 wrote to memory of 1880 3992 cmd.exe 108 PID 3992 wrote to memory of 1880 3992 cmd.exe 108 PID 3992 wrote to memory of 1880 3992 cmd.exe 108 PID 2128 wrote to memory of 2604 2128 App.exe 109 PID 2128 wrote to memory of 2604 2128 App.exe 109 PID 2128 wrote to memory of 2604 2128 App.exe 109 PID 2604 wrote to memory of 760 2604 cmd.exe 111 PID 2604 wrote to memory of 760 2604 cmd.exe 111 PID 2604 wrote to memory of 760 2604 cmd.exe 111 PID 2128 wrote to memory of 4988 2128 App.exe 112 PID 2128 wrote to memory of 4988 2128 App.exe 112
Processes
-
C:\Users\Admin\AppData\Local\Temp\c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c515a556d7cc1fb7a476fb0fb1aadaaa_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Roaming\Windows Update.exe"C:\Users\Admin\AppData\Roaming\Windows Update.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3100 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holdermail.txt"4⤵
- Accesses Microsoft Outlook accounts
PID:884
-
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe" /stext "C:\Users\Admin\AppData\Local\Temp\\holderwb.txt"4⤵PID:4040
-
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"2⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"4⤵
- Executes dropped EXE
PID:232
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F5⤵PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"4⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1392947579.xml"5⤵
- Scheduled Task/Job: Scheduled Task
PID:3908
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"6⤵
- Executes dropped EXE
PID:440
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"6⤵
- Suspicious use of WriteProcessMemory
PID:3600 -
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"8⤵
- Executes dropped EXE
PID:4776
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F9⤵PID:1880
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"8⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\734984439.xml"9⤵
- Scheduled Task/Job: Scheduled Task
PID:760
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "8⤵
- Executes dropped EXE
PID:4988 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"10⤵
- Executes dropped EXE
PID:3688
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"10⤵PID:2824
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1360 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"12⤵
- Executes dropped EXE
PID:3264
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:5084
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F13⤵PID:4592
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"12⤵PID:4408
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\339168132.xml"13⤵PID:4356
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "12⤵
- Executes dropped EXE
PID:456 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"14⤵
- Executes dropped EXE
PID:1028
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"14⤵PID:960
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1560 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"16⤵
- Executes dropped EXE
PID:2244
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"16⤵PID:4756
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F17⤵PID:3512
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"16⤵PID:440
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\833367361.xml"17⤵PID:2208
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "16⤵
- Executes dropped EXE
PID:464 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1000 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"18⤵
- Executes dropped EXE
PID:3484
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"18⤵PID:1628
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3312 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"20⤵
- Executes dropped EXE
PID:4276
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"20⤵PID:4752
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F21⤵PID:100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"20⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1208078982.xml"21⤵PID:4616
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "20⤵
- Executes dropped EXE
PID:4368 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2700 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"22⤵
- Executes dropped EXE
PID:1360
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"22⤵PID:3356
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"24⤵
- Executes dropped EXE
PID:4968
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"24⤵PID:2328
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F25⤵PID:2068
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"24⤵PID:3328
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1507915524.xml"25⤵PID:3404
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "24⤵
- Executes dropped EXE
PID:4712
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "24⤵
- Executes dropped EXE
PID:4060
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "24⤵
- Executes dropped EXE
PID:440 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5040 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"26⤵
- Executes dropped EXE
PID:3472
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"26⤵PID:2660
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4056 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"28⤵
- Executes dropped EXE
PID:4776
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"28⤵PID:2288
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F29⤵PID:640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"28⤵
- System Location Discovery: System Language Discovery
PID:2216 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\79424456.xml"29⤵
- Scheduled Task/Job: Scheduled Task
PID:1688
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "28⤵
- Executes dropped EXE
PID:1792 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"29⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"30⤵
- Executes dropped EXE
PID:4528
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"30⤵PID:1456
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2152 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"32⤵
- Executes dropped EXE
PID:4824
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"32⤵PID:2236
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F33⤵PID:3940
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"32⤵PID:4268
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1292448151.xml"33⤵
- Scheduled Task/Job: Scheduled Task
PID:2592
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "32⤵
- Executes dropped EXE
PID:3596
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "32⤵
- Executes dropped EXE
PID:3592 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4900 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"34⤵
- Executes dropped EXE
PID:2420
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"34⤵PID:2900
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV135⤵PID:2700
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"36⤵
- Executes dropped EXE
PID:4296
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"36⤵PID:628
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F37⤵PID:448
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"36⤵PID:1700
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1479888018.xml"37⤵PID:3952
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "36⤵
- Executes dropped EXE
PID:3484 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"37⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"38⤵
- Executes dropped EXE
PID:5016
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"38⤵PID:4832
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4592 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4924
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"40⤵PID:3264
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F41⤵PID:1000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"40⤵PID:1456
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1735112031.xml"41⤵PID:2756
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "40⤵
- Executes dropped EXE
PID:3356 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3516 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"42⤵
- Executes dropped EXE
PID:2156
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"42⤵PID:4408
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2916 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"44⤵
- Executes dropped EXE
PID:3564
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"44⤵PID:3676
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F45⤵PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"44⤵PID:2420
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\306620963.xml"45⤵
- Scheduled Task/Job: Scheduled Task
PID:3968
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "44⤵
- Executes dropped EXE
PID:1848 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"45⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"46⤵
- Executes dropped EXE
PID:1640
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"46⤵PID:4128
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:440 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"48⤵
- Executes dropped EXE
PID:3548
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"48⤵PID:4508
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F49⤵PID:5000
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"48⤵PID:4048
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\568935909.xml"49⤵PID:2824
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "48⤵
- Executes dropped EXE
PID:3244 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"49⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3872 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"50⤵PID:2432
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"50⤵PID:2436
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"51⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1824 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"52⤵PID:2920
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"52⤵PID:824
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F53⤵PID:4408
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"52⤵PID:4080
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\412094818.xml"53⤵
- Scheduled Task/Job: Scheduled Task
PID:4712
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "52⤵PID:3916
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "52⤵PID:4768
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"53⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4468 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"54⤵PID:3676
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"54⤵PID:5056
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"55⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"56⤵PID:2276
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"56⤵PID:540
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F57⤵PID:1640
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"56⤵PID:3708
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1864093729.xml"57⤵PID:2604
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "56⤵PID:3532
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"57⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"58⤵PID:8
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"58⤵PID:3524
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"59⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4528 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"60⤵PID:1196
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"60⤵PID:1436
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F61⤵PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"60⤵PID:2380
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1587765030.xml"61⤵
- Scheduled Task/Job: Scheduled Task
PID:4520
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "60⤵PID:2156
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"61⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3928 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"62⤵PID:3296
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"62⤵PID:3936
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"63⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:5072 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"64⤵PID:3520
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"64⤵PID:4052
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F65⤵
- System Location Discovery: System Language Discovery
PID:3824
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"64⤵PID:5004
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\705008540.xml"65⤵PID:2604
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "64⤵PID:3820
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "64⤵PID:936
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"65⤵
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"66⤵PID:1048
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"66⤵PID:4132
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"67⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4448 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"68⤵PID:2236
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"68⤵PID:4388
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV169⤵PID:4268
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F69⤵PID:4756
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"68⤵PID:1196
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\728348270.xml"69⤵
- Scheduled Task/Job: Scheduled Task
PID:3264
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "68⤵PID:3092
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"69⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:824 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"70⤵PID:3436
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"70⤵PID:3872
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"71⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3296 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"72⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"72⤵PID:2604
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F73⤵PID:2636
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"72⤵
- System Location Discovery: System Language Discovery
PID:3996 -
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\257656884.xml"73⤵PID:3820
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "72⤵PID:5072
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"73⤵
- Suspicious use of AdjustPrivilegeToken
PID:2676 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"74⤵PID:4900
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"74⤵PID:1124
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"75⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3244 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"76⤵PID:60
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"76⤵PID:3104
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV177⤵PID:4408
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F77⤵PID:4204
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"76⤵PID:2380
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\864252788.xml"77⤵PID:3444
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "76⤵PID:2432
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"77⤵
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"78⤵PID:3724
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"78⤵PID:2456
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"79⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"80⤵PID:2276
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"80⤵PID:4512
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F81⤵PID:3820
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"80⤵PID:2780
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1283576938.xml"81⤵
- Scheduled Task/Job: Scheduled Task
PID:5092
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "80⤵PID:2160
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "80⤵PID:3176
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "80⤵PID:1700
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"81⤵
- Suspicious use of AdjustPrivilegeToken
PID:5028 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"82⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"82⤵PID:4256
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"83⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"84⤵PID:1436
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"84⤵PID:4548
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F85⤵PID:1100
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"84⤵PID:4420
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1883081909.xml"85⤵
- Scheduled Task/Job: Scheduled Task
PID:1000
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "84⤵PID:4868
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "84⤵PID:2320
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "84⤵PID:3944
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "84⤵
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"85⤵
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"86⤵PID:388
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"86⤵PID:2660
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV187⤵PID:3436
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"87⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"88⤵PID:5092
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"88⤵PID:1044
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F89⤵PID:4572
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"88⤵PID:1452
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV189⤵PID:2160
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1951034168.xml"89⤵
- Scheduled Task/Job: Scheduled Task
PID:4944
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "88⤵PID:2004
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"89⤵
- Suspicious use of AdjustPrivilegeToken
PID:412 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"90⤵PID:1612
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"90⤵PID:1896
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"91⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4508 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"92⤵PID:4684
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"92⤵PID:2020
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F93⤵PID:4044
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"92⤵PID:4108
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1787102144.xml"93⤵
- Scheduled Task/Job: Scheduled Task
PID:4616
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "92⤵PID:2320
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"93⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4936 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"94⤵PID:3144
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"94⤵PID:3616
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"95⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:388 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"96⤵PID:3608
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"96⤵PID:1040
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F97⤵PID:1452
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"96⤵PID:1764
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\552973763.xml"97⤵
- Scheduled Task/Job: Scheduled Task
PID:464
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "96⤵PID:4732
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"97⤵
- Suspicious use of AdjustPrivilegeToken
PID:3864 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"98⤵PID:3320
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"98⤵PID:1100
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"99⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3000 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"100⤵PID:4044
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"100⤵PID:4548
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F101⤵
- System Location Discovery: System Language Discovery
PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"100⤵PID:1364
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1698213312.xml"101⤵
- Scheduled Task/Job: Scheduled Task
PID:4928
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "100⤵PID:1584
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"101⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:2992 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"102⤵PID:3328
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"102⤵PID:4408
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"103⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:2456 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"104⤵PID:3996
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"104⤵PID:4740
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F105⤵PID:3608
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"104⤵PID:4572
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1766165571.xml"105⤵
- Scheduled Task/Job: Scheduled Task
PID:4692
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "104⤵PID:4936
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"105⤵
- Suspicious use of AdjustPrivilegeToken
PID:1400 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"106⤵PID:4128
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"106⤵PID:1848
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"107⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"108⤵PID:2164
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"108⤵PID:4108
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F109⤵PID:4548
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"108⤵PID:692
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1834117830.xml"109⤵
- Scheduled Task/Job: Scheduled Task
PID:3312
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "108⤵PID:4356
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"109⤵
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"110⤵PID:4508
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"110⤵PID:3520
-
C:\Windows\System32\Conhost.exe\??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1111⤵PID:4460
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"111⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4512 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"112⤵PID:4004
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"112⤵PID:5100
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F113⤵
- System Location Discovery: System Language Discovery
PID:3776
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"112⤵PID:4740
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\480501841.xml"113⤵PID:2364
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "112⤵PID:2548
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"113⤵
- Suspicious use of AdjustPrivilegeToken
PID:2208 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"114⤵PID:2908
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"114⤵PID:2920
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"115⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4532 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"116⤵PID:4172
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"116⤵PID:3864
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F117⤵PID:5028
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"116⤵PID:880
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\1005131733.xml"117⤵PID:3968
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "116⤵PID:4556
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "116⤵PID:3460
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"117⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"118⤵PID:4592
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"118⤵PID:4828
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe"119⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
PID:4944 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"120⤵PID:2468
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"120⤵PID:3612
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Delete /TN "Update\Update" /F121⤵PID:2160
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd"120⤵PID:4444
-
C:\Windows\SysWOW64\schtasks.exeschtasks.exe /Create /TN "Update\Update" /XML "C:\Users\Admin\AppData\Local\Temp\347168593.xml"121⤵PID:3212
-
-
-
C:\Users\Admin\AppData\Roaming\App.exe"C:\Users\Admin\AppData\Roaming\App.exe "120⤵PID:1868
-
C:\Users\Admin\AppData\Roaming\Install\Host.exe"C:\Users\Admin\AppData\Roaming\Install\Host.exe"121⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3728 -
C:\ProgramData\coded.exe"C:\ProgramData\coded.exe"122⤵PID:4560
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-