Analysis
-
max time kernel
38s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
08/09/2024, 00:55
Behavioral task
behavioral1
Sample
d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe
-
Size
3.0MB
-
MD5
d32f6c099f99453d88f9063bd4127feb
-
SHA1
7c08dde881bf7b8d38db63e6e6fe4bf72daba213
-
SHA256
7f1dac56993ae75321c0f3d4c56e9d28e9904824d2e892aee5c210a886a3cbde
-
SHA512
d2db63312fe59c6465b0346c7c5372f6450d904f71072d08ad9f6146425cae3da54d144563b1a7a5a359d87df63187d911ea369ca05275b029ab25d9428aa109
-
SSDEEP
12288:HPFdPZdPNPFdPZdPIPFdPZdPzPFdPZdPSPFdPZdPcSDyTFtj8PjdPZdPFPFdPZdn:1DyTFtjdDyTFtjYDyTFtjSDyTFtj
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240615140.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240646640.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240623687.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240624562.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240629609.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240626640.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240645218.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240623843.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240612562.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240623140.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240643359.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240649359.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240627328.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240628343.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240647937.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240620593.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240621515.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240631875.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240647640.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240645984.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240646953.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240613609.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240613718.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240619421.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240625781.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240627125.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240613812.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240644359.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240648125.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240614000.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240615390.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240637031.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240647828.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240613078.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240626500.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240627468.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240613437.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240614937.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240622593.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240643781.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240648031.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240628187.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240637578.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240640515.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240648359.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240634062.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240634375.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240644015.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240613203.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240618203.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240618875.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240619890.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240621328.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240616546.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240620421.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240621187.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240624281.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240649453.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240615484.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240644656.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240648890.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240634687.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240612468.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation tmp240615234.exe -
Executes dropped EXE 64 IoCs
pid Process 4552 tmp240611828.exe 3560 tmp240611843.exe 5056 tmp240611875.exe 1384 tmp240611890.exe 2060 tmp240611937.exe 940 tmp240611953.exe 3524 tmp240612015.exe 3960 tmp240612031.exe 5088 tmp240612062.exe 4472 tmp240612078.exe 5024 notpad.exe 1020 tmp240612343.exe 960 tmp240612359.exe 2016 notpad.exe 4416 tmp240612468.exe 1588 tmp240612484.exe 456 notpad.exe 8 tmp240612562.exe 2184 tmp240612578.exe 2552 notpad.exe 5052 tmp240612734.exe 3604 tmp240612750.exe 3352 notpad.exe 4508 tmp240612843.exe 4404 tmp240612859.exe 2624 notpad.exe 3328 tmp240612953.exe 2632 tmp240612984.exe 1132 notpad.exe 2036 tmp240613078.exe 2296 tmp240613093.exe 1384 notpad.exe 2908 tmp240613203.exe 1976 tmp240613218.exe 4836 notpad.exe 3752 tmp240613296.exe 4016 tmp240613312.exe 3460 notpad.exe 3292 tmp240613437.exe 3468 tmp240613453.exe 2216 notpad.exe 1020 tmp240613609.exe 2748 tmp240613625.exe 656 notpad.exe 2824 tmp240613718.exe 4416 tmp240613734.exe 336 notpad.exe 3012 tmp240613812.exe 812 tmp240613828.exe 880 notpad.exe 4032 tmp240613906.exe 2928 tmp240613921.exe 2360 notpad.exe 4100 tmp240614000.exe 2032 tmp240614015.exe 4036 notpad.exe 3352 tmp240614078.exe 4936 tmp240614093.exe 1620 notpad.exe 4488 tmp240614187.exe 3312 tmp240614203.exe 3760 notpad.exe 4580 tmp240614281.exe 4860 tmp240614296.exe -
resource yara_rule behavioral2/memory/4920-0-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x00090000000233e0-8.dat upx behavioral2/files/0x000700000002342f-17.dat upx behavioral2/memory/1384-20-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3560-23-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000023432-47.dat upx behavioral2/memory/1384-50-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4920-53-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000023433-27.dat upx behavioral2/files/0x0008000000023436-59.dat upx behavioral2/memory/940-65-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3960-77-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3960-62-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/files/0x0007000000023437-83.dat upx behavioral2/memory/5024-85-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5024-106-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2016-122-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/456-150-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2552-172-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3352-194-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2624-197-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2624-207-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1132-239-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1384-256-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4836-272-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3460-274-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3460-289-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2216-305-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/656-321-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/336-337-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/880-353-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2360-369-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4036-385-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1620-401-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3760-417-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2732-433-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2784-449-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1648-465-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2016-481-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4272-497-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2508-498-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2508-514-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2292-530-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/5020-546-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1780-562-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/432-578-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/468-594-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4592-610-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2472-626-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2864-642-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4628-658-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/944-674-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3400-690-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3420-706-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4312-722-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/4372-738-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3712-754-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2296-770-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1484-786-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3752-802-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/1880-818-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/3836-834-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/8-848-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral2/memory/2872-866-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240615671.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240617250.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240618875.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240626500.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240630078.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240633812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240635515.exe File created C:\Windows\SysWOW64\notpad.exe tmp240648031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240648125.exe File created C:\Windows\SysWOW64\notpad.exe tmp240623359.exe File created C:\Windows\SysWOW64\notpad.exe tmp240638765.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644656.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240645406.exe File created C:\Windows\SysWOW64\notpad.exe tmp240647312.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240612734.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240613437.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240613609.exe File created C:\Windows\SysWOW64\notpad.exe tmp240616968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240618453.exe File created C:\Windows\SysWOW64\notpad.exe tmp240620593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240622593.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240630750.exe File created C:\Windows\SysWOW64\notpad.exe tmp240640984.exe File created C:\Windows\SysWOW64\notpad.exe tmp240646640.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240613296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240614843.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240614937.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240648031.exe File created C:\Windows\SysWOW64\notpad.exe tmp240613609.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240615578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240615906.exe File created C:\Windows\SysWOW64\notpad.exe tmp240616140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240622968.exe File created C:\Windows\SysWOW64\notpad.exe tmp240627125.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240628187.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240632796.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240637578.exe File created C:\Windows\SysWOW64\notpad.exe tmp240614937.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240619140.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240620593.exe File created C:\Windows\SysWOW64\notpad.exe tmp240620812.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240633218.exe File created C:\Windows\SysWOW64\notpad.exe tmp240633812.exe File created C:\Windows\SysWOW64\notpad.exe tmp240634062.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240636765.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240642218.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240642828.exe File created C:\Windows\SysWOW64\notpad.exe tmp240644015.exe File created C:\Windows\SysWOW64\notpad.exe tmp240614625.exe File created C:\Windows\SysWOW64\notpad.exe tmp240618781.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240640296.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240624468.exe File created C:\Windows\SysWOW64\notpad.exe tmp240633625.exe File created C:\Windows\SysWOW64\notpad.exe tmp240645406.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240617468.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240624750.exe File created C:\Windows\SysWOW64\notpad.exe tmp240628187.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240641187.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240643359.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240646453.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240649359.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp240616140.exe File created C:\Windows\SysWOW64\notpad.exe- tmp240618203.exe File created C:\Windows\SysWOW64\notpad.exe tmp240620968.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240614765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240643968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240647218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240618781.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240634078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240644218.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240649375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240622765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240633828.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240630375.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240640312.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240616156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240633640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240614015.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240614500.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240637265.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648937.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240649468.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240649484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240646796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240627578.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240648093.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240650000.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240627125.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240644390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240611890.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240617156.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240635359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240635109.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240646953.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240612484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240643921.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240612843.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240647843.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240638765.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240647531.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240618796.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240630078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240614093.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240622968.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tmp240622234.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language notpad.exe -
Modifies registry class 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240622765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240634687.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240613718.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620593.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644656.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240618781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240619234.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240619890.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240621734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240619421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644015.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646734.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240615765.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240620968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240632484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240615906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240622109.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625343.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240613078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240624281.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240640296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240616671.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240626796.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240648125.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614843.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240615312.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240628515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240631875.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240642078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649359.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240622421.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240635093.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240636156.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240643921.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240645078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625453.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240629906.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240637406.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240647937.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240617140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240624468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240625250.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240635515.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240649968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614484.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240630750.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240612562.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240635203.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240639500.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240644968.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240646640.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614078.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp240614281.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4920 wrote to memory of 4552 4920 d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe 83 PID 4920 wrote to memory of 4552 4920 d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe 83 PID 4920 wrote to memory of 4552 4920 d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe 83 PID 4920 wrote to memory of 3560 4920 d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe 84 PID 4920 wrote to memory of 3560 4920 d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe 84 PID 4920 wrote to memory of 3560 4920 d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe 84 PID 3560 wrote to memory of 5056 3560 tmp240611843.exe 86 PID 3560 wrote to memory of 5056 3560 tmp240611843.exe 86 PID 3560 wrote to memory of 5056 3560 tmp240611843.exe 86 PID 3560 wrote to memory of 1384 3560 tmp240611843.exe 87 PID 3560 wrote to memory of 1384 3560 tmp240611843.exe 87 PID 3560 wrote to memory of 1384 3560 tmp240611843.exe 87 PID 1384 wrote to memory of 2060 1384 tmp240611890.exe 88 PID 1384 wrote to memory of 2060 1384 tmp240611890.exe 88 PID 1384 wrote to memory of 2060 1384 tmp240611890.exe 88 PID 1384 wrote to memory of 940 1384 tmp240611890.exe 89 PID 1384 wrote to memory of 940 1384 tmp240611890.exe 89 PID 1384 wrote to memory of 940 1384 tmp240611890.exe 89 PID 940 wrote to memory of 3524 940 tmp240611953.exe 90 PID 940 wrote to memory of 3524 940 tmp240611953.exe 90 PID 940 wrote to memory of 3524 940 tmp240611953.exe 90 PID 940 wrote to memory of 3960 940 tmp240611953.exe 91 PID 940 wrote to memory of 3960 940 tmp240611953.exe 91 PID 940 wrote to memory of 3960 940 tmp240611953.exe 91 PID 3960 wrote to memory of 5088 3960 tmp240612031.exe 92 PID 3960 wrote to memory of 5088 3960 tmp240612031.exe 92 PID 3960 wrote to memory of 5088 3960 tmp240612031.exe 92 PID 3960 wrote to memory of 4472 3960 tmp240612031.exe 93 PID 3960 wrote to memory of 4472 3960 tmp240612031.exe 93 PID 3960 wrote to memory of 4472 3960 tmp240612031.exe 93 PID 4552 wrote to memory of 5024 4552 tmp240611828.exe 94 PID 4552 wrote to memory of 5024 4552 tmp240611828.exe 94 PID 4552 wrote to memory of 5024 4552 tmp240611828.exe 94 PID 5024 wrote to memory of 1020 5024 notpad.exe 95 PID 5024 wrote to memory of 1020 5024 notpad.exe 95 PID 5024 wrote to memory of 1020 5024 notpad.exe 95 PID 5024 wrote to memory of 960 5024 notpad.exe 96 PID 5024 wrote to memory of 960 5024 notpad.exe 96 PID 5024 wrote to memory of 960 5024 notpad.exe 96 PID 1020 wrote to memory of 2016 1020 tmp240612343.exe 98 PID 1020 wrote to memory of 2016 1020 tmp240612343.exe 98 PID 1020 wrote to memory of 2016 1020 tmp240612343.exe 98 PID 2016 wrote to memory of 4416 2016 notpad.exe 131 PID 2016 wrote to memory of 4416 2016 notpad.exe 131 PID 2016 wrote to memory of 4416 2016 notpad.exe 131 PID 2016 wrote to memory of 1588 2016 notpad.exe 100 PID 2016 wrote to memory of 1588 2016 notpad.exe 100 PID 2016 wrote to memory of 1588 2016 notpad.exe 100 PID 4416 wrote to memory of 456 4416 tmp240612468.exe 101 PID 4416 wrote to memory of 456 4416 tmp240612468.exe 101 PID 4416 wrote to memory of 456 4416 tmp240612468.exe 101 PID 456 wrote to memory of 8 456 notpad.exe 102 PID 456 wrote to memory of 8 456 notpad.exe 102 PID 456 wrote to memory of 8 456 notpad.exe 102 PID 456 wrote to memory of 2184 456 notpad.exe 103 PID 456 wrote to memory of 2184 456 notpad.exe 103 PID 456 wrote to memory of 2184 456 notpad.exe 103 PID 8 wrote to memory of 2552 8 tmp240612562.exe 105 PID 8 wrote to memory of 2552 8 tmp240612562.exe 105 PID 8 wrote to memory of 2552 8 tmp240612562.exe 105 PID 2552 wrote to memory of 5052 2552 notpad.exe 106 PID 2552 wrote to memory of 5052 2552 notpad.exe 106 PID 2552 wrote to memory of 5052 2552 notpad.exe 106 PID 2552 wrote to memory of 3604 2552 notpad.exe 170
Processes
-
C:\Users\Admin\AppData\Local\Temp\d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d32f6c099f99453d88f9063bd4127feb_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4920 -
C:\Users\Admin\AppData\Local\Temp\tmp240611828.exeC:\Users\Admin\AppData\Local\Temp\tmp240611828.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\tmp240612343.exeC:\Users\Admin\AppData\Local\Temp\tmp240612343.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\tmp240612468.exeC:\Users\Admin\AppData\Local\Temp\tmp240612468.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:456 -
C:\Users\Admin\AppData\Local\Temp\tmp240612562.exeC:\Users\Admin\AppData\Local\Temp\tmp240612562.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:8 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\tmp240612734.exeC:\Users\Admin\AppData\Local\Temp\tmp240612734.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5052 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
PID:3352 -
C:\Users\Admin\AppData\Local\Temp\tmp240612843.exeC:\Users\Admin\AppData\Local\Temp\tmp240612843.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"13⤵
- Executes dropped EXE
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\tmp240612953.exeC:\Users\Admin\AppData\Local\Temp\tmp240612953.exe14⤵
- Executes dropped EXE
PID:3328 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"15⤵
- Executes dropped EXE
PID:1132 -
C:\Users\Admin\AppData\Local\Temp\tmp240613078.exeC:\Users\Admin\AppData\Local\Temp\tmp240613078.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2036 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"17⤵
- Executes dropped EXE
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\tmp240613203.exeC:\Users\Admin\AppData\Local\Temp\tmp240613203.exe18⤵
- Checks computer location settings
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4836 -
C:\Users\Admin\AppData\Local\Temp\tmp240613296.exeC:\Users\Admin\AppData\Local\Temp\tmp240613296.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3460 -
C:\Users\Admin\AppData\Local\Temp\tmp240613437.exeC:\Users\Admin\AppData\Local\Temp\tmp240613437.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3292 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵
- Executes dropped EXE
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\tmp240613609.exeC:\Users\Admin\AppData\Local\Temp\tmp240613609.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1020 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵
- Executes dropped EXE
PID:656 -
C:\Users\Admin\AppData\Local\Temp\tmp240613718.exeC:\Users\Admin\AppData\Local\Temp\tmp240613718.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2824 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵
- Executes dropped EXE
PID:336 -
C:\Users\Admin\AppData\Local\Temp\tmp240613812.exeC:\Users\Admin\AppData\Local\Temp\tmp240613812.exe28⤵
- Checks computer location settings
- Executes dropped EXE
PID:3012 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\tmp240613906.exeC:\Users\Admin\AppData\Local\Temp\tmp240613906.exe30⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"31⤵
- Executes dropped EXE
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\tmp240614000.exeC:\Users\Admin\AppData\Local\Temp\tmp240614000.exe32⤵
- Checks computer location settings
- Executes dropped EXE
PID:4100 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"33⤵
- Executes dropped EXE
PID:4036 -
C:\Users\Admin\AppData\Local\Temp\tmp240614078.exeC:\Users\Admin\AppData\Local\Temp\tmp240614078.exe34⤵
- Executes dropped EXE
- Modifies registry class
PID:3352 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"35⤵
- Executes dropped EXE
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\tmp240614187.exeC:\Users\Admin\AppData\Local\Temp\tmp240614187.exe36⤵
- Executes dropped EXE
PID:4488 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Executes dropped EXE
PID:3760 -
C:\Users\Admin\AppData\Local\Temp\tmp240614281.exeC:\Users\Admin\AppData\Local\Temp\tmp240614281.exe38⤵
- Executes dropped EXE
- Modifies registry class
PID:4580 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\tmp240614375.exeC:\Users\Admin\AppData\Local\Temp\tmp240614375.exe40⤵PID:1044
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\tmp240614484.exeC:\Users\Admin\AppData\Local\Temp\tmp240614484.exe42⤵
- Modifies registry class
PID:5040 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\tmp240614625.exeC:\Users\Admin\AppData\Local\Temp\tmp240614625.exe44⤵
- Drops file in System32 directory
PID:4916 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"45⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\tmp240614750.exeC:\Users\Admin\AppData\Local\Temp\tmp240614750.exe46⤵PID:2192
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:4272
-
C:\Users\Admin\AppData\Local\Temp\tmp240614843.exeC:\Users\Admin\AppData\Local\Temp\tmp240614843.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:4356 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵
- System Location Discovery: System Language Discovery
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\tmp240614937.exeC:\Users\Admin\AppData\Local\Temp\tmp240614937.exe50⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3304 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\tmp240615015.exeC:\Users\Admin\AppData\Local\Temp\tmp240615015.exe52⤵PID:3096
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:5020
-
C:\Users\Admin\AppData\Local\Temp\tmp240615140.exeC:\Users\Admin\AppData\Local\Temp\tmp240615140.exe54⤵
- Checks computer location settings
PID:972 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"55⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\tmp240615234.exeC:\Users\Admin\AppData\Local\Temp\tmp240615234.exe56⤵
- Checks computer location settings
PID:2248 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:432
-
C:\Users\Admin\AppData\Local\Temp\tmp240615312.exeC:\Users\Admin\AppData\Local\Temp\tmp240615312.exe58⤵
- Modifies registry class
PID:4828 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\tmp240615390.exeC:\Users\Admin\AppData\Local\Temp\tmp240615390.exe60⤵
- Checks computer location settings
PID:3560 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\tmp240615484.exeC:\Users\Admin\AppData\Local\Temp\tmp240615484.exe62⤵
- Checks computer location settings
PID:2528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"63⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\tmp240615578.exeC:\Users\Admin\AppData\Local\Temp\tmp240615578.exe64⤵
- Drops file in System32 directory
PID:4660 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"65⤵PID:2864
-
C:\Users\Admin\AppData\Local\Temp\tmp240615671.exeC:\Users\Admin\AppData\Local\Temp\tmp240615671.exe66⤵
- Drops file in System32 directory
PID:2868 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"67⤵PID:4628
-
C:\Users\Admin\AppData\Local\Temp\tmp240615765.exeC:\Users\Admin\AppData\Local\Temp\tmp240615765.exe68⤵
- Modifies registry class
PID:2460 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\tmp240615906.exeC:\Users\Admin\AppData\Local\Temp\tmp240615906.exe70⤵
- Drops file in System32 directory
- Modifies registry class
PID:3252 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:3400
-
C:\Users\Admin\AppData\Local\Temp\tmp240616031.exeC:\Users\Admin\AppData\Local\Temp\tmp240616031.exe72⤵PID:336
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"73⤵PID:3420
-
C:\Users\Admin\AppData\Local\Temp\tmp240616140.exeC:\Users\Admin\AppData\Local\Temp\tmp240616140.exe74⤵
- Drops file in System32 directory
PID:1104 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"75⤵PID:4312
-
C:\Users\Admin\AppData\Local\Temp\tmp240616281.exeC:\Users\Admin\AppData\Local\Temp\tmp240616281.exe76⤵PID:4844
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"77⤵PID:4372
-
C:\Users\Admin\AppData\Local\Temp\tmp240616437.exeC:\Users\Admin\AppData\Local\Temp\tmp240616437.exe78⤵PID:4756
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:3712
-
C:\Users\Admin\AppData\Local\Temp\tmp240616546.exeC:\Users\Admin\AppData\Local\Temp\tmp240616546.exe80⤵
- Checks computer location settings
PID:3988 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\tmp240616671.exeC:\Users\Admin\AppData\Local\Temp\tmp240616671.exe82⤵
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:1484
-
C:\Users\Admin\AppData\Local\Temp\tmp240616843.exeC:\Users\Admin\AppData\Local\Temp\tmp240616843.exe84⤵PID:4012
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"85⤵PID:3752
-
C:\Users\Admin\AppData\Local\Temp\tmp240616968.exeC:\Users\Admin\AppData\Local\Temp\tmp240616968.exe86⤵
- Drops file in System32 directory
PID:4576 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"87⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\tmp240617140.exeC:\Users\Admin\AppData\Local\Temp\tmp240617140.exe88⤵
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"89⤵
- System Location Discovery: System Language Discovery
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\tmp240617250.exeC:\Users\Admin\AppData\Local\Temp\tmp240617250.exe90⤵
- Drops file in System32 directory
PID:1788 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:8
-
C:\Users\Admin\AppData\Local\Temp\tmp240617468.exeC:\Users\Admin\AppData\Local\Temp\tmp240617468.exe92⤵
- Drops file in System32 directory
PID:1004 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:2872
-
C:\Users\Admin\AppData\Local\Temp\tmp240617625.exeC:\Users\Admin\AppData\Local\Temp\tmp240617625.exe94⤵PID:2380
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"95⤵PID:4952
-
C:\Users\Admin\AppData\Local\Temp\tmp240617796.exeC:\Users\Admin\AppData\Local\Temp\tmp240617796.exe96⤵PID:3268
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"97⤵PID:4936
-
C:\Users\Admin\AppData\Local\Temp\tmp240617968.exeC:\Users\Admin\AppData\Local\Temp\tmp240617968.exe98⤵PID:3580
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"99⤵PID:3344
-
C:\Users\Admin\AppData\Local\Temp\tmp240618062.exeC:\Users\Admin\AppData\Local\Temp\tmp240618062.exe100⤵PID:4368
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\tmp240618203.exeC:\Users\Admin\AppData\Local\Temp\tmp240618203.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
PID:1792 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵PID:1564
-
C:\Users\Admin\AppData\Local\Temp\tmp240618453.exeC:\Users\Admin\AppData\Local\Temp\tmp240618453.exe104⤵
- Drops file in System32 directory
PID:5056 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\tmp240618781.exeC:\Users\Admin\AppData\Local\Temp\tmp240618781.exe106⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4964 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:3552
-
C:\Users\Admin\AppData\Local\Temp\tmp240618875.exeC:\Users\Admin\AppData\Local\Temp\tmp240618875.exe108⤵
- Checks computer location settings
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:3412
-
C:\Users\Admin\AppData\Local\Temp\tmp240619140.exeC:\Users\Admin\AppData\Local\Temp\tmp240619140.exe110⤵
- Drops file in System32 directory
PID:1608 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:4900
-
C:\Users\Admin\AppData\Local\Temp\tmp240619234.exeC:\Users\Admin\AppData\Local\Temp\tmp240619234.exe112⤵
- Modifies registry class
PID:4752 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:3220
-
C:\Users\Admin\AppData\Local\Temp\tmp240619328.exeC:\Users\Admin\AppData\Local\Temp\tmp240619328.exe114⤵PID:4272
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\tmp240619421.exeC:\Users\Admin\AppData\Local\Temp\tmp240619421.exe116⤵
- Checks computer location settings
- Modifies registry class
PID:1032 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"117⤵PID:4740
-
C:\Users\Admin\AppData\Local\Temp\tmp240619671.exeC:\Users\Admin\AppData\Local\Temp\tmp240619671.exe118⤵PID:1988
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"119⤵PID:3928
-
C:\Users\Admin\AppData\Local\Temp\tmp240619890.exeC:\Users\Admin\AppData\Local\Temp\tmp240619890.exe120⤵
- Checks computer location settings
- Modifies registry class
PID:864 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"121⤵PID:3284
-
C:\Users\Admin\AppData\Local\Temp\tmp240620046.exeC:\Users\Admin\AppData\Local\Temp\tmp240620046.exe122⤵PID:1992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-