Analysis
-
max time kernel
149s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 08:10
Behavioral task
behavioral1
Sample
e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe
-
Size
49KB
-
MD5
e20be673c779693371329d7278b9dcf5
-
SHA1
bc2d40d138a8fa9c75994eca291e9f02e9fcde49
-
SHA256
b3b252002e374b300d425905213589f669702429da2ce1cfe530b53c9832bba7
-
SHA512
5fcdcacea547c336460f3a11003cdc3c3942b8754147c2e4c719b731897cd0c3ff809b84cf7491f24928889c33dec55181fd7bae4e4a2868479787dcd3cdfd95
-
SSDEEP
768:CiFKqnQefsPgy9YeLqdXM0rF37LK/9SLxgjKPqg7A41QaHmzgtuDyH8+:FwqnQUar9YeLolrZ7LzLzF7sbDs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 1 IoCs
resource yara_rule behavioral1/files/0x00080000000186d2-6.dat modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2784 winlogo.exe 2700 winlogo.exe 2668 winlogo.exe 2732 winlogo.exe 2576 winlogo.exe 2720 winlogo.exe 2548 winlogo.exe 2580 winlogo.exe 2988 winlogo.exe 1960 winlogo.exe 1892 winlogo.exe 2360 winlogo.exe 2760 winlogo.exe 2296 winlogo.exe 2284 winlogo.exe 2356 winlogo.exe 2044 winlogo.exe 584 winlogo.exe 644 winlogo.exe 2040 winlogo.exe 2616 winlogo.exe 532 winlogo.exe 2108 winlogo.exe 2008 winlogo.exe 2532 winlogo.exe 2116 winlogo.exe 2368 winlogo.exe 840 winlogo.exe 2472 winlogo.exe 2528 winlogo.exe 3048 winlogo.exe 408 winlogo.exe 2160 winlogo.exe 2396 winlogo.exe 1900 winlogo.exe 1288 winlogo.exe 1784 winlogo.exe 2512 winlogo.exe 1632 winlogo.exe 1656 winlogo.exe 752 winlogo.exe 2112 winlogo.exe 1212 winlogo.exe 2956 winlogo.exe 1980 winlogo.exe 2504 winlogo.exe 2508 winlogo.exe 2328 winlogo.exe 1636 winlogo.exe 1624 winlogo.exe 1552 winlogo.exe 1728 winlogo.exe 2204 winlogo.exe 3016 winlogo.exe 2788 winlogo.exe 2780 winlogo.exe 988 winlogo.exe 2916 winlogo.exe 2636 winlogo.exe 2824 winlogo.exe 2776 winlogo.exe 2752 winlogo.exe 2464 winlogo.exe 2608 winlogo.exe -
Loads dropped DLL 64 IoCs
pid Process 2660 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 2660 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 2784 winlogo.exe 2700 winlogo.exe 2700 winlogo.exe 2668 winlogo.exe 2732 winlogo.exe 2732 winlogo.exe 2576 winlogo.exe 2720 winlogo.exe 2720 winlogo.exe 2548 winlogo.exe 2580 winlogo.exe 2580 winlogo.exe 2988 winlogo.exe 1960 winlogo.exe 1960 winlogo.exe 1892 winlogo.exe 2360 winlogo.exe 2360 winlogo.exe 2760 winlogo.exe 2296 winlogo.exe 2296 winlogo.exe 2284 winlogo.exe 2356 winlogo.exe 2356 winlogo.exe 584 winlogo.exe 584 winlogo.exe 2040 winlogo.exe 2040 winlogo.exe 532 winlogo.exe 532 winlogo.exe 2008 winlogo.exe 2008 winlogo.exe 2116 winlogo.exe 2116 winlogo.exe 840 winlogo.exe 840 winlogo.exe 2528 winlogo.exe 2528 winlogo.exe 408 winlogo.exe 408 winlogo.exe 2396 winlogo.exe 2396 winlogo.exe 1288 winlogo.exe 1288 winlogo.exe 2512 winlogo.exe 2512 winlogo.exe 1656 winlogo.exe 1656 winlogo.exe 2112 winlogo.exe 2112 winlogo.exe 2956 winlogo.exe 2956 winlogo.exe 2504 winlogo.exe 2504 winlogo.exe 2328 winlogo.exe 2328 winlogo.exe 1624 winlogo.exe 1624 winlogo.exe 1728 winlogo.exe 1728 winlogo.exe 3016 winlogo.exe 3016 winlogo.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2368 set thread context of 840 2368 winlogo.exe 59 PID 2332 set thread context of 1952 2332 winlogo.exe 113 PID 2080 set thread context of 2880 2080 winlogo.exe 141 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2660 1668 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2660 1668 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2660 1668 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2660 1668 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2660 1668 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 31 PID 1668 wrote to memory of 2660 1668 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 31 PID 2660 wrote to memory of 2784 2660 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 32 PID 2660 wrote to memory of 2784 2660 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 32 PID 2660 wrote to memory of 2784 2660 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 32 PID 2660 wrote to memory of 2784 2660 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 32 PID 2784 wrote to memory of 2700 2784 winlogo.exe 33 PID 2784 wrote to memory of 2700 2784 winlogo.exe 33 PID 2784 wrote to memory of 2700 2784 winlogo.exe 33 PID 2784 wrote to memory of 2700 2784 winlogo.exe 33 PID 2784 wrote to memory of 2700 2784 winlogo.exe 33 PID 2784 wrote to memory of 2700 2784 winlogo.exe 33 PID 2700 wrote to memory of 2668 2700 winlogo.exe 34 PID 2700 wrote to memory of 2668 2700 winlogo.exe 34 PID 2700 wrote to memory of 2668 2700 winlogo.exe 34 PID 2700 wrote to memory of 2668 2700 winlogo.exe 34 PID 2668 wrote to memory of 2732 2668 winlogo.exe 35 PID 2668 wrote to memory of 2732 2668 winlogo.exe 35 PID 2668 wrote to memory of 2732 2668 winlogo.exe 35 PID 2668 wrote to memory of 2732 2668 winlogo.exe 35 PID 2668 wrote to memory of 2732 2668 winlogo.exe 35 PID 2668 wrote to memory of 2732 2668 winlogo.exe 35 PID 2732 wrote to memory of 2576 2732 winlogo.exe 36 PID 2732 wrote to memory of 2576 2732 winlogo.exe 36 PID 2732 wrote to memory of 2576 2732 winlogo.exe 36 PID 2732 wrote to memory of 2576 2732 winlogo.exe 36 PID 2576 wrote to memory of 2720 2576 winlogo.exe 37 PID 2576 wrote to memory of 2720 2576 winlogo.exe 37 PID 2576 wrote to memory of 2720 2576 winlogo.exe 37 PID 2576 wrote to memory of 2720 2576 winlogo.exe 37 PID 2576 wrote to memory of 2720 2576 winlogo.exe 37 PID 2576 wrote to memory of 2720 2576 winlogo.exe 37 PID 2720 wrote to memory of 2548 2720 winlogo.exe 38 PID 2720 wrote to memory of 2548 2720 winlogo.exe 38 PID 2720 wrote to memory of 2548 2720 winlogo.exe 38 PID 2720 wrote to memory of 2548 2720 winlogo.exe 38 PID 2548 wrote to memory of 2580 2548 winlogo.exe 39 PID 2548 wrote to memory of 2580 2548 winlogo.exe 39 PID 2548 wrote to memory of 2580 2548 winlogo.exe 39 PID 2548 wrote to memory of 2580 2548 winlogo.exe 39 PID 2548 wrote to memory of 2580 2548 winlogo.exe 39 PID 2548 wrote to memory of 2580 2548 winlogo.exe 39 PID 2580 wrote to memory of 2988 2580 winlogo.exe 40 PID 2580 wrote to memory of 2988 2580 winlogo.exe 40 PID 2580 wrote to memory of 2988 2580 winlogo.exe 40 PID 2580 wrote to memory of 2988 2580 winlogo.exe 40 PID 2988 wrote to memory of 1960 2988 winlogo.exe 41 PID 2988 wrote to memory of 1960 2988 winlogo.exe 41 PID 2988 wrote to memory of 1960 2988 winlogo.exe 41 PID 2988 wrote to memory of 1960 2988 winlogo.exe 41 PID 2988 wrote to memory of 1960 2988 winlogo.exe 41 PID 2988 wrote to memory of 1960 2988 winlogo.exe 41 PID 1960 wrote to memory of 1892 1960 winlogo.exe 42 PID 1960 wrote to memory of 1892 1960 winlogo.exe 42 PID 1960 wrote to memory of 1892 1960 winlogo.exe 42 PID 1960 wrote to memory of 1892 1960 winlogo.exe 42 PID 1892 wrote to memory of 2360 1892 winlogo.exe 43 PID 1892 wrote to memory of 2360 1892 winlogo.exe 43 PID 1892 wrote to memory of 2360 1892 winlogo.exe 43 PID 1892 wrote to memory of 2360 1892 winlogo.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe%NONE%2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2784 -
C:\Windows\SysWOW64\winlogo.exe%NONE%4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\SysWOW64\winlogo.exe%NONE%6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Windows\SysWOW64\winlogo.exe%NONE%8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\winlogo.exe%NONE%10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\winlogo.exe%NONE%12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Windows\SysWOW64\winlogo.exe%NONE%14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2360 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2760 -
C:\Windows\SysWOW64\winlogo.exe%NONE%16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2296 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\winlogo.exe%NONE%18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2356 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe19⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\winlogo.exe%NONE%20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:584 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\SysWOW64\winlogo.exe%NONE%22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2040 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe23⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\SysWOW64\winlogo.exe%NONE%24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:532 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2108 -
C:\Windows\SysWOW64\winlogo.exe%NONE%26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2008 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe27⤵
- Executes dropped EXE
PID:2532 -
C:\Windows\SysWOW64\winlogo.exe%NONE%28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2116 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2368 -
C:\Windows\SysWOW64\winlogo.exe%NONE%30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:840 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe31⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\winlogo.exe%NONE%32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe33⤵
- Executes dropped EXE
PID:3048 -
C:\Windows\SysWOW64\winlogo.exe%NONE%34⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\winlogo.exe%NONE%36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2396 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1900 -
C:\Windows\SysWOW64\winlogo.exe%NONE%38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1288 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe39⤵
- Executes dropped EXE
PID:1784 -
C:\Windows\SysWOW64\winlogo.exe%NONE%40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2512 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe41⤵
- Executes dropped EXE
PID:1632 -
C:\Windows\SysWOW64\winlogo.exe%NONE%42⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1656 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe43⤵
- Executes dropped EXE
PID:752 -
C:\Windows\SysWOW64\winlogo.exe%NONE%44⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe45⤵
- Executes dropped EXE
PID:1212 -
C:\Windows\SysWOW64\winlogo.exe%NONE%46⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2956 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe47⤵
- Executes dropped EXE
PID:1980 -
C:\Windows\SysWOW64\winlogo.exe%NONE%48⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe49⤵
- Executes dropped EXE
PID:2508 -
C:\Windows\SysWOW64\winlogo.exe%NONE%50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2328 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe51⤵
- Executes dropped EXE
PID:1636 -
C:\Windows\SysWOW64\winlogo.exe%NONE%52⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1624 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe53⤵
- Executes dropped EXE
PID:1552 -
C:\Windows\SysWOW64\winlogo.exe%NONE%54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1728 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204 -
C:\Windows\SysWOW64\winlogo.exe%NONE%56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3016 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe57⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\winlogo.exe%NONE%58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2780 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:988 -
C:\Windows\SysWOW64\winlogo.exe%NONE%60⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Windows\SysWOW64\winlogo.exe%NONE%62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2824 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe63⤵
- Executes dropped EXE
PID:2776 -
C:\Windows\SysWOW64\winlogo.exe%NONE%64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2752 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe65⤵
- Executes dropped EXE
PID:2464 -
C:\Windows\SysWOW64\winlogo.exe%NONE%66⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe67⤵PID:1128
-
C:\Windows\SysWOW64\winlogo.exe%NONE%68⤵
- Drops file in System32 directory
PID:1192 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe69⤵PID:1904
-
C:\Windows\SysWOW64\winlogo.exe%NONE%70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe71⤵
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\SysWOW64\winlogo.exe%NONE%72⤵PID:2152
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe73⤵PID:992
-
C:\Windows\SysWOW64\winlogo.exe%NONE%74⤵
- Drops file in System32 directory
PID:2124 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe75⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\winlogo.exe%NONE%76⤵
- Drops file in System32 directory
PID:700 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe77⤵PID:1348
-
C:\Windows\SysWOW64\winlogo.exe%NONE%78⤵
- Drops file in System32 directory
PID:668 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe79⤵PID:340
-
C:\Windows\SysWOW64\winlogo.exe%NONE%80⤵
- Drops file in System32 directory
PID:1432 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe81⤵PID:2456
-
C:\Windows\SysWOW64\winlogo.exe%NONE%82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2332 -
C:\Windows\SysWOW64\winlogo.exe%NONE%84⤵
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe85⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\winlogo.exe%NONE%86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe87⤵PID:2656
-
C:\Windows\SysWOW64\winlogo.exe%NONE%88⤵
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe89⤵
- System Location Discovery: System Language Discovery
PID:2704 -
C:\Windows\SysWOW64\winlogo.exe%NONE%90⤵PID:2592
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe91⤵
- System Location Discovery: System Language Discovery
PID:1620 -
C:\Windows\SysWOW64\winlogo.exe%NONE%92⤵
- Drops file in System32 directory
PID:1776 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe93⤵PID:1832
-
C:\Windows\SysWOW64\winlogo.exe%NONE%94⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1712 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe95⤵
- System Location Discovery: System Language Discovery
PID:2232 -
C:\Windows\SysWOW64\winlogo.exe%NONE%96⤵PID:2980
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe97⤵PID:2248
-
C:\Windows\SysWOW64\winlogo.exe%NONE%98⤵
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe99⤵PID:1884
-
C:\Windows\SysWOW64\winlogo.exe%NONE%100⤵
- Drops file in System32 directory
PID:772 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe101⤵
- System Location Discovery: System Language Discovery
PID:3024 -
C:\Windows\SysWOW64\winlogo.exe%NONE%102⤵PID:2740
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe103⤵
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\winlogo.exe%NONE%104⤵
- Drops file in System32 directory
PID:2840 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe105⤵
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\winlogo.exe%NONE%106⤵
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe107⤵PID:1440
-
C:\Windows\SysWOW64\winlogo.exe%NONE%108⤵
- Drops file in System32 directory
PID:2928 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe109⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\winlogo.exe%NONE%110⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe111⤵
- Suspicious use of SetThreadContext
PID:2080 -
C:\Windows\SysWOW64\winlogo.exe%NONE%112⤵PID:2880
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe113⤵
- System Location Discovery: System Language Discovery
PID:1788 -
C:\Windows\SysWOW64\winlogo.exe%NONE%114⤵
- Drops file in System32 directory
PID:1428 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe115⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\winlogo.exe%NONE%116⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe117⤵
- System Location Discovery: System Language Discovery
PID:2168 -
C:\Windows\SysWOW64\winlogo.exe%NONE%118⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe119⤵PID:1260
-
C:\Windows\SysWOW64\winlogo.exe%NONE%120⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1996 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe121⤵
- System Location Discovery: System Language Discovery
PID:2672 -
C:\Windows\SysWOW64\winlogo.exe%NONE%122⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1676
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-