Analysis
-
max time kernel
68s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
29/08/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe
-
Size
105KB
-
MD5
c864c1b4e17200be75086d4d83613afa
-
SHA1
fa0b12798269ef69600d70063567e3e6a006d75d
-
SHA256
543861a86e1b56d34fe5a10d398d52e8ee11d269dd997caa4de9ebbbe9903003
-
SHA512
66517de944283a83232de854e3db0cda7b784850da8ad1674526c2e572f1112fd0f7efeeb362fd1695c44f2d98e492eb1328ba6b79a66cf635ff78964b23d924
-
SSDEEP
1536:1U46qi9FOluMjC0CWGo/S1DWlDzEYPdrNMBUT/KqrEvAJNyTqJ:x6qeF8uOd3t/S1DeHJNMG2uEvAJNqa
Malware Config
Signatures
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N}\StubPath = "C:\\Windows\\system32\\windows.exe" windows.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{P0AD2-T29Y0-G62H8-0W417-M0F6N} windows.exe -
Executes dropped EXE 64 IoCs
pid Process 2796 windows.exe 2548 windows.exe 2020 windows.exe 1768 windows.exe 2168 windows.exe 996 windows.exe 2708 windows.exe 2056 windows.exe 2976 windows.exe 2296 windows.exe 2224 windows.exe 2392 windows.exe 2116 windows.exe 2852 windows.exe 1592 windows.exe 1064 windows.exe 1996 windows.exe 1416 windows.exe 1308 windows.exe 2496 windows.exe 2080 windows.exe 2256 windows.exe 1888 windows.exe 1688 windows.exe 2780 windows.exe 2760 windows.exe 2544 windows.exe 2800 windows.exe 1412 windows.exe 2264 windows.exe 2160 windows.exe 2128 windows.exe 2876 windows.exe 1212 windows.exe 3056 windows.exe 2992 windows.exe 1208 windows.exe 1192 windows.exe 2196 windows.exe 1988 windows.exe 2828 windows.exe 760 windows.exe 2480 windows.exe 1048 windows.exe 1704 windows.exe 2248 windows.exe 2008 windows.exe 564 windows.exe 2316 windows.exe 1880 windows.exe 2908 windows.exe 1668 windows.exe 1888 windows.exe 1684 windows.exe 2896 windows.exe 2812 windows.exe 2684 windows.exe 2476 windows.exe 1768 windows.exe 2864 windows.exe 2588 windows.exe 2848 windows.exe 2756 windows.exe 3060 windows.exe -
Loads dropped DLL 64 IoCs
pid Process 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 2796 windows.exe 2548 windows.exe 2548 windows.exe 1768 windows.exe 1768 windows.exe 996 windows.exe 996 windows.exe 2056 windows.exe 2056 windows.exe 2296 windows.exe 2296 windows.exe 2392 windows.exe 2392 windows.exe 2852 windows.exe 2852 windows.exe 1064 windows.exe 1064 windows.exe 1416 windows.exe 1416 windows.exe 2496 windows.exe 2496 windows.exe 2256 windows.exe 2256 windows.exe 1688 windows.exe 1688 windows.exe 2760 windows.exe 2760 windows.exe 2800 windows.exe 2800 windows.exe 2264 windows.exe 2264 windows.exe 2128 windows.exe 2128 windows.exe 1212 windows.exe 1212 windows.exe 2992 windows.exe 2992 windows.exe 1192 windows.exe 1192 windows.exe 1988 windows.exe 1988 windows.exe 760 windows.exe 760 windows.exe 1048 windows.exe 1048 windows.exe 2248 windows.exe 2248 windows.exe 564 windows.exe 564 windows.exe 1880 windows.exe 1880 windows.exe 1668 windows.exe 1668 windows.exe 1684 windows.exe 1684 windows.exe 2812 windows.exe 2812 windows.exe 2476 windows.exe 2476 windows.exe 2864 windows.exe 2864 windows.exe 2848 windows.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe Set value (str) \REGISTRY\USER\S-1-5-21-2958949473-3205530200-1453100116-1000\Software\Microsoft\Windows\CurrentVersion\Run\P0AD2-T29Y0-G62H8-0W = "C:\\Windows\\system32\\windows.exe" windows.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe File opened for modification C:\Windows\SysWOW64\windows.exe windows.exe File created C:\Windows\SysWOW64\windows.exe windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 2660 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Token: SeDebugPrivilege 2660 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Token: SeDebugPrivilege 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Token: SeDebugPrivilege 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe Token: SeDebugPrivilege 2796 windows.exe Token: SeDebugPrivilege 2796 windows.exe Token: SeDebugPrivilege 2548 windows.exe Token: SeDebugPrivilege 2548 windows.exe Token: SeDebugPrivilege 2020 windows.exe Token: SeDebugPrivilege 2020 windows.exe Token: SeDebugPrivilege 1768 windows.exe Token: SeDebugPrivilege 1768 windows.exe Token: SeDebugPrivilege 2168 windows.exe Token: SeDebugPrivilege 2168 windows.exe Token: SeDebugPrivilege 996 windows.exe Token: SeDebugPrivilege 996 windows.exe Token: SeDebugPrivilege 2708 windows.exe Token: SeDebugPrivilege 2708 windows.exe Token: SeDebugPrivilege 2056 windows.exe Token: SeDebugPrivilege 2056 windows.exe Token: SeDebugPrivilege 2976 windows.exe Token: SeDebugPrivilege 2976 windows.exe Token: SeDebugPrivilege 2296 windows.exe Token: SeDebugPrivilege 2296 windows.exe Token: SeDebugPrivilege 2224 windows.exe Token: SeDebugPrivilege 2224 windows.exe Token: SeDebugPrivilege 2392 windows.exe Token: SeDebugPrivilege 2392 windows.exe Token: SeDebugPrivilege 2116 windows.exe Token: SeDebugPrivilege 2116 windows.exe Token: SeDebugPrivilege 2852 windows.exe Token: SeDebugPrivilege 2852 windows.exe Token: SeDebugPrivilege 1592 windows.exe Token: SeDebugPrivilege 1592 windows.exe Token: SeDebugPrivilege 1064 windows.exe Token: SeDebugPrivilege 1064 windows.exe Token: SeDebugPrivilege 1996 windows.exe Token: SeDebugPrivilege 1996 windows.exe Token: SeDebugPrivilege 1416 windows.exe Token: SeDebugPrivilege 1416 windows.exe Token: SeDebugPrivilege 1308 windows.exe Token: SeDebugPrivilege 1308 windows.exe Token: SeDebugPrivilege 2496 windows.exe Token: SeDebugPrivilege 2496 windows.exe Token: SeDebugPrivilege 2080 windows.exe Token: SeDebugPrivilege 2080 windows.exe Token: SeDebugPrivilege 2256 windows.exe Token: SeDebugPrivilege 2256 windows.exe Token: SeDebugPrivilege 1888 windows.exe Token: SeDebugPrivilege 1888 windows.exe Token: SeDebugPrivilege 1688 windows.exe Token: SeDebugPrivilege 1688 windows.exe Token: SeDebugPrivilege 2780 windows.exe Token: SeDebugPrivilege 2780 windows.exe Token: SeDebugPrivilege 2760 windows.exe Token: SeDebugPrivilege 2760 windows.exe Token: SeDebugPrivilege 2544 windows.exe Token: SeDebugPrivilege 2544 windows.exe Token: SeDebugPrivilege 2800 windows.exe Token: SeDebugPrivilege 2800 windows.exe Token: SeDebugPrivilege 1412 windows.exe Token: SeDebugPrivilege 1412 windows.exe Token: SeDebugPrivilege 2264 windows.exe Token: SeDebugPrivilege 2264 windows.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2720 2660 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2720 2660 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2720 2660 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 30 PID 2660 wrote to memory of 2720 2660 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 30 PID 2720 wrote to memory of 2796 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2796 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2796 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 31 PID 2720 wrote to memory of 2796 2720 c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe 31 PID 2796 wrote to memory of 2548 2796 windows.exe 32 PID 2796 wrote to memory of 2548 2796 windows.exe 32 PID 2796 wrote to memory of 2548 2796 windows.exe 32 PID 2796 wrote to memory of 2548 2796 windows.exe 32 PID 2548 wrote to memory of 2020 2548 windows.exe 33 PID 2548 wrote to memory of 2020 2548 windows.exe 33 PID 2548 wrote to memory of 2020 2548 windows.exe 33 PID 2548 wrote to memory of 2020 2548 windows.exe 33 PID 2020 wrote to memory of 1768 2020 windows.exe 34 PID 2020 wrote to memory of 1768 2020 windows.exe 34 PID 2020 wrote to memory of 1768 2020 windows.exe 34 PID 2020 wrote to memory of 1768 2020 windows.exe 34 PID 1768 wrote to memory of 2168 1768 windows.exe 35 PID 1768 wrote to memory of 2168 1768 windows.exe 35 PID 1768 wrote to memory of 2168 1768 windows.exe 35 PID 1768 wrote to memory of 2168 1768 windows.exe 35 PID 2168 wrote to memory of 996 2168 windows.exe 36 PID 2168 wrote to memory of 996 2168 windows.exe 36 PID 2168 wrote to memory of 996 2168 windows.exe 36 PID 2168 wrote to memory of 996 2168 windows.exe 36 PID 996 wrote to memory of 2708 996 windows.exe 37 PID 996 wrote to memory of 2708 996 windows.exe 37 PID 996 wrote to memory of 2708 996 windows.exe 37 PID 996 wrote to memory of 2708 996 windows.exe 37 PID 2708 wrote to memory of 2056 2708 windows.exe 38 PID 2708 wrote to memory of 2056 2708 windows.exe 38 PID 2708 wrote to memory of 2056 2708 windows.exe 38 PID 2708 wrote to memory of 2056 2708 windows.exe 38 PID 2056 wrote to memory of 2976 2056 windows.exe 39 PID 2056 wrote to memory of 2976 2056 windows.exe 39 PID 2056 wrote to memory of 2976 2056 windows.exe 39 PID 2056 wrote to memory of 2976 2056 windows.exe 39 PID 2976 wrote to memory of 2296 2976 windows.exe 40 PID 2976 wrote to memory of 2296 2976 windows.exe 40 PID 2976 wrote to memory of 2296 2976 windows.exe 40 PID 2976 wrote to memory of 2296 2976 windows.exe 40 PID 2296 wrote to memory of 2224 2296 windows.exe 41 PID 2296 wrote to memory of 2224 2296 windows.exe 41 PID 2296 wrote to memory of 2224 2296 windows.exe 41 PID 2296 wrote to memory of 2224 2296 windows.exe 41 PID 2224 wrote to memory of 2392 2224 windows.exe 42 PID 2224 wrote to memory of 2392 2224 windows.exe 42 PID 2224 wrote to memory of 2392 2224 windows.exe 42 PID 2224 wrote to memory of 2392 2224 windows.exe 42 PID 2392 wrote to memory of 2116 2392 windows.exe 43 PID 2392 wrote to memory of 2116 2392 windows.exe 43 PID 2392 wrote to memory of 2116 2392 windows.exe 43 PID 2392 wrote to memory of 2116 2392 windows.exe 43 PID 2116 wrote to memory of 2852 2116 windows.exe 44 PID 2116 wrote to memory of 2852 2116 windows.exe 44 PID 2116 wrote to memory of 2852 2116 windows.exe 44 PID 2116 wrote to memory of 2852 2116 windows.exe 44 PID 2852 wrote to memory of 1592 2852 windows.exe 45 PID 2852 wrote to memory of 1592 2852 windows.exe 45 PID 2852 wrote to memory of 1592 2852 windows.exe 45 PID 2852 wrote to memory of 1592 2852 windows.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\c864c1b4e17200be75086d4d83613afa_JaffaCakes118.exe" /r2⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"5⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"7⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:996 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"9⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"11⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r14⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1592 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r18⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1064 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1996 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r20⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1416 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"21⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1308 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2496 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"23⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2080 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r24⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2256 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"25⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1888 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1688 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2780 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2760 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2544 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r30⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2800 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1412 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r32⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2264 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"33⤵
- Executes dropped EXE
PID:2160 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r34⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
PID:2128 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2876 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1212 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"37⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2992 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"39⤵
- Executes dropped EXE
PID:1208 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r40⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1192 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"41⤵
- Executes dropped EXE
PID:2196 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r42⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:1988 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"43⤵
- Executes dropped EXE
PID:2828 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r44⤵
- Executes dropped EXE
- Loads dropped DLL
PID:760 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"45⤵
- Executes dropped EXE
PID:2480 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r46⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1048 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"47⤵
- Executes dropped EXE
PID:1704 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r48⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2248 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"49⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r50⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:564 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r52⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1880 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"53⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r54⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:1668 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"55⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"57⤵
- Executes dropped EXE
PID:2896 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r58⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2812 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"59⤵
- Executes dropped EXE
PID:2684 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r60⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2476 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"61⤵
- Executes dropped EXE
PID:1768 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r62⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
PID:2864 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"63⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2588 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r64⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2848 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"65⤵
- Executes dropped EXE
PID:2756 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r66⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
PID:3060 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"67⤵
- System Location Discovery: System Language Discovery
PID:1240 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r68⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
PID:1816 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"69⤵
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r70⤵
- Adds Run key to start application
PID:2120 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"71⤵PID:2124
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r72⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"73⤵PID:2984
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r74⤵
- Drops file in System32 directory
PID:2468 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"75⤵PID:2260
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r76⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
PID:2972 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"77⤵PID:1524
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r78⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"79⤵
- System Location Discovery: System Language Discovery
PID:2304 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r80⤵
- Boot or Logon Autostart Execution: Active Setup
PID:2432 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"81⤵PID:2444
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r82⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1868 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"83⤵PID:2420
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r84⤵
- Adds Run key to start application
PID:1576 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"85⤵PID:2716
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r86⤵
- Drops file in System32 directory
PID:2000 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"87⤵PID:2652
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r88⤵
- Boot or Logon Autostart Execution: Active Setup
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"89⤵
- System Location Discovery: System Language Discovery
PID:3048 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r90⤵
- Adds Run key to start application
PID:2372 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"91⤵PID:1768
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r92⤵PID:2820
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"93⤵PID:2588
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r94⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2772 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"95⤵
- System Location Discovery: System Language Discovery
PID:1212 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r96⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"97⤵PID:1836
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r98⤵
- Drops file in System32 directory
PID:2976 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"99⤵
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r100⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2400 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"101⤵PID:1504
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r102⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"103⤵PID:1080
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:848 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"105⤵PID:872
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r106⤵
- Adds Run key to start application
PID:336 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"107⤵PID:1996
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r108⤵PID:340
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"109⤵PID:2600
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r110⤵
- Boot or Logon Autostart Execution: Active Setup
PID:1084 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"111⤵PID:1884
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r112⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"113⤵PID:1580
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r114⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"115⤵PID:2728
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r116⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in System32 directory
PID:2832 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"117⤵PID:2896
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r118⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
PID:484 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"119⤵PID:2112
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r120⤵
- Boot or Logon Autostart Execution: Active Setup
- Drops file in System32 directory
PID:2276 -
C:\Windows\SysWOW64\windows.exe"C:\Windows\system32\windows.exe"121⤵PID:2308
-
C:\Windows\SysWOW64\windows.exe"C:\Windows\SysWOW64\windows.exe" /r122⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:320
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-