Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
88s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 20:31
Static task
static1
Behavioral task
behavioral1
Sample
db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe
-
Size
78KB
-
MD5
db2a29365fa49dea85f6ffe5ef3dd98d
-
SHA1
3606c3d1e60eeb80b47eccb96933c52beabd9488
-
SHA256
d5bb40879e82d6c8b8587f122910a4ba7e96f1ac38f957f7edc1842e979b4f1a
-
SHA512
954fff0359bcf7131a4d65ceb43d605396a3cc4ec7ae99e8b9905659e24f502fb7ee60c2f511d695cbc3e14e5458511ea97d7eb13cabbcb92bad22ca4b754aa4
-
SSDEEP
1536:r1L5+h66Te0e0qPWrzVa2AIxBXBFsVNM1AQ4IIWoZcdGjJvuEc4J:ZLn6y0e49uIxB0OB+HJGE7
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe Key value queried \REGISTRY\USER\S-1-5-21-355097885-2402257403-2971294179-1000\Control Panel\International\Geo\Nation wmi.exe -
Executes dropped EXE 64 IoCs
pid Process 1352 wmi.exe 3508 wmi.exe 2556 wmi.exe 2984 wmi.exe 4388 wmi.exe 4032 wmi.exe 3012 wmi.exe 3120 wmi.exe 964 wmi.exe 4028 wmi.exe 700 wmi.exe 4044 wmi.exe 3620 wmi.exe 1964 wmi.exe 4996 wmi.exe 4740 wmi.exe 2824 wmi.exe 1256 wmi.exe 3928 wmi.exe 1620 wmi.exe 1592 wmi.exe 3224 wmi.exe 3420 wmi.exe 3780 wmi.exe 3980 wmi.exe 3708 wmi.exe 1792 wmi.exe 4144 wmi.exe 4724 wmi.exe 2484 wmi.exe 4876 wmi.exe 4400 wmi.exe 4452 wmi.exe 5036 wmi.exe 1068 wmi.exe 4024 wmi.exe 1668 wmi.exe 4036 wmi.exe 3740 wmi.exe 3192 wmi.exe 3952 wmi.exe 3752 wmi.exe 4352 wmi.exe 3680 wmi.exe 4712 wmi.exe 812 wmi.exe 1116 wmi.exe 2000 wmi.exe 4600 wmi.exe 3512 wmi.exe 404 wmi.exe 628 wmi.exe 1780 wmi.exe 3816 wmi.exe 3932 wmi.exe 3412 wmi.exe 1552 wmi.exe 1396 wmi.exe 832 wmi.exe 3036 wmi.exe 1672 wmi.exe 740 wmi.exe 4928 wmi.exe 2040 wmi.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat Process not Found File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File created C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exe wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\scripts.ini wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\autorun.bat wmi.exe File opened for modification C:\Windows\SysWOW64\GroupPolicy\gpt.ini Process not Found -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wmi.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 1352 wmi.exe 1352 wmi.exe 1352 wmi.exe 1352 wmi.exe 1352 wmi.exe 1352 wmi.exe 3508 wmi.exe 3508 wmi.exe 3508 wmi.exe 3508 wmi.exe 3508 wmi.exe 3508 wmi.exe 2556 wmi.exe 2556 wmi.exe 2556 wmi.exe 2556 wmi.exe 2556 wmi.exe 2556 wmi.exe 2984 wmi.exe 2984 wmi.exe 2984 wmi.exe 2984 wmi.exe 2984 wmi.exe 2984 wmi.exe 4388 wmi.exe 4388 wmi.exe 4388 wmi.exe 4388 wmi.exe 4388 wmi.exe 4388 wmi.exe 4032 wmi.exe 4032 wmi.exe 4032 wmi.exe 4032 wmi.exe 4032 wmi.exe 4032 wmi.exe 3012 wmi.exe 3012 wmi.exe 3012 wmi.exe 3012 wmi.exe 3012 wmi.exe 3012 wmi.exe 3120 wmi.exe 3120 wmi.exe 3120 wmi.exe 3120 wmi.exe 3120 wmi.exe 3120 wmi.exe 964 wmi.exe 964 wmi.exe 964 wmi.exe 964 wmi.exe 964 wmi.exe 964 wmi.exe 4028 wmi.exe 4028 wmi.exe 4028 wmi.exe 4028 wmi.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 1352 wmi.exe Token: SeIncBasePriorityPrivilege 3508 wmi.exe Token: SeIncBasePriorityPrivilege 2556 wmi.exe Token: SeIncBasePriorityPrivilege 2984 wmi.exe Token: SeIncBasePriorityPrivilege 4388 wmi.exe Token: SeIncBasePriorityPrivilege 4032 wmi.exe Token: SeIncBasePriorityPrivilege 3012 wmi.exe Token: SeIncBasePriorityPrivilege 3120 wmi.exe Token: SeIncBasePriorityPrivilege 964 wmi.exe Token: SeIncBasePriorityPrivilege 4028 wmi.exe Token: SeIncBasePriorityPrivilege 700 wmi.exe Token: SeIncBasePriorityPrivilege 4044 wmi.exe Token: SeIncBasePriorityPrivilege 3620 wmi.exe Token: SeIncBasePriorityPrivilege 1964 wmi.exe Token: SeIncBasePriorityPrivilege 4996 wmi.exe Token: SeIncBasePriorityPrivilege 4740 wmi.exe Token: SeIncBasePriorityPrivilege 2824 wmi.exe Token: SeIncBasePriorityPrivilege 1256 wmi.exe Token: SeIncBasePriorityPrivilege 3928 wmi.exe Token: SeIncBasePriorityPrivilege 1620 wmi.exe Token: SeIncBasePriorityPrivilege 1592 wmi.exe Token: SeIncBasePriorityPrivilege 3224 wmi.exe Token: SeIncBasePriorityPrivilege 3420 wmi.exe Token: SeIncBasePriorityPrivilege 3780 wmi.exe Token: SeIncBasePriorityPrivilege 3980 wmi.exe Token: SeIncBasePriorityPrivilege 3708 wmi.exe Token: SeIncBasePriorityPrivilege 1792 wmi.exe Token: SeIncBasePriorityPrivilege 4144 wmi.exe Token: SeIncBasePriorityPrivilege 4724 wmi.exe Token: SeIncBasePriorityPrivilege 2484 wmi.exe Token: SeIncBasePriorityPrivilege 4876 wmi.exe Token: SeIncBasePriorityPrivilege 4400 wmi.exe Token: SeIncBasePriorityPrivilege 4452 wmi.exe Token: SeIncBasePriorityPrivilege 5036 wmi.exe Token: SeIncBasePriorityPrivilege 1068 wmi.exe Token: SeIncBasePriorityPrivilege 4024 wmi.exe Token: SeIncBasePriorityPrivilege 1668 wmi.exe Token: SeIncBasePriorityPrivilege 4036 wmi.exe Token: SeIncBasePriorityPrivilege 3740 wmi.exe Token: SeIncBasePriorityPrivilege 3192 wmi.exe Token: SeIncBasePriorityPrivilege 3952 wmi.exe Token: SeIncBasePriorityPrivilege 3752 wmi.exe Token: SeIncBasePriorityPrivilege 4352 wmi.exe Token: SeIncBasePriorityPrivilege 3680 wmi.exe Token: SeIncBasePriorityPrivilege 4712 wmi.exe Token: SeIncBasePriorityPrivilege 812 wmi.exe Token: SeIncBasePriorityPrivilege 1116 wmi.exe Token: SeIncBasePriorityPrivilege 2000 wmi.exe Token: SeIncBasePriorityPrivilege 4600 wmi.exe Token: SeIncBasePriorityPrivilege 3512 wmi.exe Token: SeIncBasePriorityPrivilege 404 wmi.exe Token: SeIncBasePriorityPrivilege 628 wmi.exe Token: SeIncBasePriorityPrivilege 1780 wmi.exe Token: SeIncBasePriorityPrivilege 3816 wmi.exe Token: SeIncBasePriorityPrivilege 3932 wmi.exe Token: SeIncBasePriorityPrivilege 3412 wmi.exe Token: SeIncBasePriorityPrivilege 1552 wmi.exe Token: SeIncBasePriorityPrivilege 1396 wmi.exe Token: SeIncBasePriorityPrivilege 832 wmi.exe Token: SeIncBasePriorityPrivilege 3036 wmi.exe Token: SeIncBasePriorityPrivilege 740 wmi.exe Token: SeIncBasePriorityPrivilege 4928 wmi.exe Token: SeIncBasePriorityPrivilege 2040 wmi.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3200 wrote to memory of 1352 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 85 PID 3200 wrote to memory of 1352 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 85 PID 3200 wrote to memory of 1352 3200 db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe 85 PID 1352 wrote to memory of 3508 1352 wmi.exe 87 PID 1352 wrote to memory of 3508 1352 wmi.exe 87 PID 1352 wrote to memory of 3508 1352 wmi.exe 87 PID 3508 wrote to memory of 2556 3508 wmi.exe 88 PID 3508 wrote to memory of 2556 3508 wmi.exe 88 PID 3508 wrote to memory of 2556 3508 wmi.exe 88 PID 2556 wrote to memory of 2984 2556 wmi.exe 89 PID 2556 wrote to memory of 2984 2556 wmi.exe 89 PID 2556 wrote to memory of 2984 2556 wmi.exe 89 PID 2984 wrote to memory of 4388 2984 wmi.exe 90 PID 2984 wrote to memory of 4388 2984 wmi.exe 90 PID 2984 wrote to memory of 4388 2984 wmi.exe 90 PID 4388 wrote to memory of 4032 4388 wmi.exe 91 PID 4388 wrote to memory of 4032 4388 wmi.exe 91 PID 4388 wrote to memory of 4032 4388 wmi.exe 91 PID 4032 wrote to memory of 3012 4032 wmi.exe 92 PID 4032 wrote to memory of 3012 4032 wmi.exe 92 PID 4032 wrote to memory of 3012 4032 wmi.exe 92 PID 3012 wrote to memory of 3120 3012 wmi.exe 93 PID 3012 wrote to memory of 3120 3012 wmi.exe 93 PID 3012 wrote to memory of 3120 3012 wmi.exe 93 PID 3120 wrote to memory of 964 3120 wmi.exe 94 PID 3120 wrote to memory of 964 3120 wmi.exe 94 PID 3120 wrote to memory of 964 3120 wmi.exe 94 PID 964 wrote to memory of 4028 964 wmi.exe 95 PID 964 wrote to memory of 4028 964 wmi.exe 95 PID 964 wrote to memory of 4028 964 wmi.exe 95 PID 4028 wrote to memory of 700 4028 wmi.exe 97 PID 4028 wrote to memory of 700 4028 wmi.exe 97 PID 4028 wrote to memory of 700 4028 wmi.exe 97 PID 700 wrote to memory of 4044 700 wmi.exe 98 PID 700 wrote to memory of 4044 700 wmi.exe 98 PID 700 wrote to memory of 4044 700 wmi.exe 98 PID 4044 wrote to memory of 3620 4044 wmi.exe 99 PID 4044 wrote to memory of 3620 4044 wmi.exe 99 PID 4044 wrote to memory of 3620 4044 wmi.exe 99 PID 3620 wrote to memory of 1964 3620 wmi.exe 100 PID 3620 wrote to memory of 1964 3620 wmi.exe 100 PID 3620 wrote to memory of 1964 3620 wmi.exe 100 PID 1964 wrote to memory of 4996 1964 wmi.exe 101 PID 1964 wrote to memory of 4996 1964 wmi.exe 101 PID 1964 wrote to memory of 4996 1964 wmi.exe 101 PID 4996 wrote to memory of 4740 4996 wmi.exe 102 PID 4996 wrote to memory of 4740 4996 wmi.exe 102 PID 4996 wrote to memory of 4740 4996 wmi.exe 102 PID 4740 wrote to memory of 2824 4740 wmi.exe 103 PID 4740 wrote to memory of 2824 4740 wmi.exe 103 PID 4740 wrote to memory of 2824 4740 wmi.exe 103 PID 2824 wrote to memory of 1256 2824 wmi.exe 104 PID 2824 wrote to memory of 1256 2824 wmi.exe 104 PID 2824 wrote to memory of 1256 2824 wmi.exe 104 PID 1256 wrote to memory of 3928 1256 wmi.exe 105 PID 1256 wrote to memory of 3928 1256 wmi.exe 105 PID 1256 wrote to memory of 3928 1256 wmi.exe 105 PID 3928 wrote to memory of 1620 3928 wmi.exe 106 PID 3928 wrote to memory of 1620 3928 wmi.exe 106 PID 3928 wrote to memory of 1620 3928 wmi.exe 106 PID 1620 wrote to memory of 1592 1620 wmi.exe 107 PID 1620 wrote to memory of 1592 1620 wmi.exe 107 PID 1620 wrote to memory of 1592 1620 wmi.exe 107 PID 1592 wrote to memory of 3224 1592 wmi.exe 108
Processes
-
C:\Users\Admin\AppData\Local\Temp\db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\db2a29365fa49dea85f6ffe5ef3dd98d_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4032 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3120 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4028 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:700 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe13⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe14⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3620 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe15⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4996 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe17⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe19⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe20⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1620 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe22⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1592 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3224 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe24⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3420 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3780 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe26⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3980 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe27⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3708 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe28⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1792 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe29⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4144 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe30⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4724 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe31⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2484 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4876 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe33⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4400 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4452 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:5036 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe36⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1068 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe37⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe38⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1668 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe39⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4036 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe40⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3740 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe41⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3192 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe42⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3952 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe43⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3752 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4352 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3680 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe46⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4712 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe47⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:812 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1116 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe49⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4600 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3512 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:404 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe53⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:628 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe54⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1780 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3816 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe56⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3932 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe57⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3412 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1552 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe59⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1396 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe60⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3036 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe62⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe63⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:740 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:4928 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe65⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe66⤵
- Checks computer location settings
PID:1936 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe67⤵PID:3996
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe68⤵
- Drops file in System32 directory
PID:4704 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe69⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe70⤵PID:3628
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe71⤵PID:4880
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe72⤵PID:4668
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe73⤵PID:1968
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe74⤵PID:1000
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe75⤵
- Checks computer location settings
PID:4868 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe76⤵PID:1864
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe77⤵
- Checks computer location settings
PID:1564 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe78⤵PID:1180
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe79⤵PID:1476
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe80⤵PID:3300
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe81⤵
- Checks computer location settings
- Drops file in System32 directory
PID:528 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe82⤵PID:2892
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe83⤵PID:3152
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe84⤵
- Checks computer location settings
PID:2220 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe85⤵
- Checks computer location settings
PID:4772 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe86⤵PID:1356
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe87⤵PID:4296
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe88⤵
- System Location Discovery: System Language Discovery
PID:4336 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe89⤵PID:2420
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe90⤵PID:5140
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe91⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5176 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe92⤵PID:5208
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe93⤵
- Drops file in System32 directory
PID:5240 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe94⤵PID:5276
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe95⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5372 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe96⤵PID:5448
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe97⤵PID:5484
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe98⤵PID:5516
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe99⤵PID:5548
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe100⤵PID:5580
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe101⤵PID:5612
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe102⤵
- Drops file in System32 directory
PID:5648 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe103⤵
- Checks computer location settings
PID:5684 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe104⤵PID:5716
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe105⤵PID:5748
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe106⤵
- Drops file in System32 directory
PID:5780 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe107⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5816 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe108⤵PID:5848
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe109⤵PID:5880
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe110⤵PID:5912
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe111⤵
- System Location Discovery: System Language Discovery
PID:5944 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe112⤵PID:5980
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe113⤵
- Checks computer location settings
PID:6012 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe114⤵
- Checks computer location settings
- Drops file in System32 directory
PID:6044 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe115⤵PID:6076
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe116⤵
- System Location Discovery: System Language Discovery
PID:6108 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe117⤵PID:5128
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe118⤵
- Checks computer location settings
PID:5196 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe119⤵
- Drops file in System32 directory
PID:5248 -
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe120⤵PID:5324
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe121⤵PID:5512
-
C:\Windows\SysWOW64\GroupPolicy\User\Scripts\Logon\wmi.exeC:\Windows\system32\GroupPolicy\User\Scripts\Logon\wmi.exe122⤵PID:5576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-