Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
15-09-2024 08:10
Behavioral task
behavioral1
Sample
e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe
-
Size
49KB
-
MD5
e20be673c779693371329d7278b9dcf5
-
SHA1
bc2d40d138a8fa9c75994eca291e9f02e9fcde49
-
SHA256
b3b252002e374b300d425905213589f669702429da2ce1cfe530b53c9832bba7
-
SHA512
5fcdcacea547c336460f3a11003cdc3c3942b8754147c2e4c719b731897cd0c3ff809b84cf7491f24928889c33dec55181fd7bae4e4a2868479787dcd3cdfd95
-
SSDEEP
768:CiFKqnQefsPgy9YeLqdXM0rF37LK/9SLxgjKPqg7A41QaHmzgtuDyH8+:FwqnQUar9YeLolrZ7LzLzF7sbDs
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 18 IoCs
resource yara_rule behavioral2/files/0x00090000000234af-5.dat modiloader_stage2 behavioral2/memory/3544-49-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/4860-48-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/3736-53-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/2988-47-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/872-46-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/3988-45-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/4392-54-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/3252-55-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/2924-60-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/644-59-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/4872-67-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/1276-70-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/3496-77-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/4776-76-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/3668-82-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/864-91-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 behavioral2/memory/3156-112-0x0000000030000000-0x0000000030018000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 872 winlogo.exe 3520 winlogo.exe 2988 winlogo.exe 4780 winlogo.exe 4860 winlogo.exe 2848 winlogo.exe 3544 winlogo.exe 4672 winlogo.exe 3736 winlogo.exe 3624 winlogo.exe 4392 winlogo.exe 3724 winlogo.exe 3252 winlogo.exe 932 winlogo.exe 644 winlogo.exe 1748 winlogo.exe 2924 winlogo.exe 1532 winlogo.exe 4872 winlogo.exe 1560 winlogo.exe 1276 winlogo.exe 1136 winlogo.exe 4776 winlogo.exe 3364 winlogo.exe 3496 winlogo.exe 2024 winlogo.exe 3668 winlogo.exe 4880 winlogo.exe 864 winlogo.exe 4236 winlogo.exe 3156 winlogo.exe 704 winlogo.exe 728 winlogo.exe 1452 winlogo.exe 2028 winlogo.exe 3728 winlogo.exe 4072 winlogo.exe 4412 winlogo.exe 4460 winlogo.exe 2732 winlogo.exe 216 winlogo.exe 1636 winlogo.exe 2872 winlogo.exe 4004 winlogo.exe 2780 winlogo.exe 4056 winlogo.exe 1824 winlogo.exe 392 winlogo.exe 4668 winlogo.exe 5056 winlogo.exe 744 winlogo.exe 3088 winlogo.exe 3856 winlogo.exe 4508 winlogo.exe 4368 winlogo.exe 2836 winlogo.exe 4620 winlogo.exe 4964 winlogo.exe 1768 winlogo.exe 3036 winlogo.exe 4352 winlogo.exe 3976 winlogo.exe 2892 winlogo.exe 1368 winlogo.exe -
Drops file in System32 directory 42 IoCs
description ioc Process File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File opened for modification C:\Windows\SysWOW64\winlogo.exe e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe File created C:\Windows\SysWOW64\winlogo.exe winlogo.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogo.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3988 wrote to memory of 4624 3988 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 85 PID 3988 wrote to memory of 4624 3988 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 85 PID 3988 wrote to memory of 4624 3988 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 85 PID 3988 wrote to memory of 4624 3988 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 85 PID 3988 wrote to memory of 4624 3988 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 85 PID 4624 wrote to memory of 872 4624 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 86 PID 4624 wrote to memory of 872 4624 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 86 PID 4624 wrote to memory of 872 4624 e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe 86 PID 872 wrote to memory of 3520 872 winlogo.exe 87 PID 872 wrote to memory of 3520 872 winlogo.exe 87 PID 872 wrote to memory of 3520 872 winlogo.exe 87 PID 872 wrote to memory of 3520 872 winlogo.exe 87 PID 872 wrote to memory of 3520 872 winlogo.exe 87 PID 3520 wrote to memory of 2988 3520 winlogo.exe 88 PID 3520 wrote to memory of 2988 3520 winlogo.exe 88 PID 3520 wrote to memory of 2988 3520 winlogo.exe 88 PID 2988 wrote to memory of 4780 2988 winlogo.exe 89 PID 2988 wrote to memory of 4780 2988 winlogo.exe 89 PID 2988 wrote to memory of 4780 2988 winlogo.exe 89 PID 2988 wrote to memory of 4780 2988 winlogo.exe 89 PID 2988 wrote to memory of 4780 2988 winlogo.exe 89 PID 4780 wrote to memory of 4860 4780 winlogo.exe 90 PID 4780 wrote to memory of 4860 4780 winlogo.exe 90 PID 4780 wrote to memory of 4860 4780 winlogo.exe 90 PID 4860 wrote to memory of 2848 4860 winlogo.exe 91 PID 4860 wrote to memory of 2848 4860 winlogo.exe 91 PID 4860 wrote to memory of 2848 4860 winlogo.exe 91 PID 4860 wrote to memory of 2848 4860 winlogo.exe 91 PID 4860 wrote to memory of 2848 4860 winlogo.exe 91 PID 2848 wrote to memory of 3544 2848 winlogo.exe 92 PID 2848 wrote to memory of 3544 2848 winlogo.exe 92 PID 2848 wrote to memory of 3544 2848 winlogo.exe 92 PID 3544 wrote to memory of 4672 3544 winlogo.exe 93 PID 3544 wrote to memory of 4672 3544 winlogo.exe 93 PID 3544 wrote to memory of 4672 3544 winlogo.exe 93 PID 3544 wrote to memory of 4672 3544 winlogo.exe 93 PID 3544 wrote to memory of 4672 3544 winlogo.exe 93 PID 4672 wrote to memory of 3736 4672 winlogo.exe 94 PID 4672 wrote to memory of 3736 4672 winlogo.exe 94 PID 4672 wrote to memory of 3736 4672 winlogo.exe 94 PID 3736 wrote to memory of 3624 3736 winlogo.exe 95 PID 3736 wrote to memory of 3624 3736 winlogo.exe 95 PID 3736 wrote to memory of 3624 3736 winlogo.exe 95 PID 3736 wrote to memory of 3624 3736 winlogo.exe 95 PID 3736 wrote to memory of 3624 3736 winlogo.exe 95 PID 3624 wrote to memory of 4392 3624 winlogo.exe 96 PID 3624 wrote to memory of 4392 3624 winlogo.exe 96 PID 3624 wrote to memory of 4392 3624 winlogo.exe 96 PID 4392 wrote to memory of 3724 4392 winlogo.exe 97 PID 4392 wrote to memory of 3724 4392 winlogo.exe 97 PID 4392 wrote to memory of 3724 4392 winlogo.exe 97 PID 4392 wrote to memory of 3724 4392 winlogo.exe 97 PID 4392 wrote to memory of 3724 4392 winlogo.exe 97 PID 3724 wrote to memory of 3252 3724 winlogo.exe 98 PID 3724 wrote to memory of 3252 3724 winlogo.exe 98 PID 3724 wrote to memory of 3252 3724 winlogo.exe 98 PID 3252 wrote to memory of 932 3252 winlogo.exe 99 PID 3252 wrote to memory of 932 3252 winlogo.exe 99 PID 3252 wrote to memory of 932 3252 winlogo.exe 99 PID 3252 wrote to memory of 932 3252 winlogo.exe 99 PID 3252 wrote to memory of 932 3252 winlogo.exe 99 PID 932 wrote to memory of 644 932 winlogo.exe 100 PID 932 wrote to memory of 644 932 winlogo.exe 100 PID 932 wrote to memory of 644 932 winlogo.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Users\Admin\AppData\Local\Temp\e20be673c779693371329d7278b9dcf5_JaffaCakes118.exe%NONE%2⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4624 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\winlogo.exe%NONE%4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\winlogo.exe%NONE%6⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\winlogo.exe%NONE%8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3544 -
C:\Windows\SysWOW64\winlogo.exe%NONE%10⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4672 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\winlogo.exe%NONE%12⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3624 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\winlogo.exe%NONE%14⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\winlogo.exe%NONE%16⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:932 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe17⤵
- Executes dropped EXE
PID:644 -
C:\Windows\SysWOW64\winlogo.exe%NONE%18⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\winlogo.exe%NONE%20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1532 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4872 -
C:\Windows\SysWOW64\winlogo.exe%NONE%22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1560 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1276 -
C:\Windows\SysWOW64\winlogo.exe%NONE%24⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1136 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4776 -
C:\Windows\SysWOW64\winlogo.exe%NONE%26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3364 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\SysWOW64\winlogo.exe%NONE%28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3668 -
C:\Windows\SysWOW64\winlogo.exe%NONE%30⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:864 -
C:\Windows\SysWOW64\winlogo.exe%NONE%32⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4236 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3156 -
C:\Windows\SysWOW64\winlogo.exe%NONE%34⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:704 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe35⤵
- Executes dropped EXE
PID:728 -
C:\Windows\SysWOW64\winlogo.exe%NONE%36⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1452 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\winlogo.exe%NONE%38⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3728 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4072 -
C:\Windows\SysWOW64\winlogo.exe%NONE%40⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4412 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4460 -
C:\Windows\SysWOW64\winlogo.exe%NONE%42⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:216 -
C:\Windows\SysWOW64\winlogo.exe%NONE%44⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1636 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2872 -
C:\Windows\SysWOW64\winlogo.exe%NONE%46⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4004 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\winlogo.exe%NONE%48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4056 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\winlogo.exe%NONE%50⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:392 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4668 -
C:\Windows\SysWOW64\winlogo.exe%NONE%52⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5056 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:744 -
C:\Windows\SysWOW64\winlogo.exe%NONE%54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3088 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3856 -
C:\Windows\SysWOW64\winlogo.exe%NONE%56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4508 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe57⤵
- Executes dropped EXE
PID:4368 -
C:\Windows\SysWOW64\winlogo.exe%NONE%58⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2836 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4620 -
C:\Windows\SysWOW64\winlogo.exe%NONE%60⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4964 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1768 -
C:\Windows\SysWOW64\winlogo.exe%NONE%62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3036 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe63⤵
- Executes dropped EXE
PID:4352 -
C:\Windows\SysWOW64\winlogo.exe%NONE%64⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3976 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2892 -
C:\Windows\SysWOW64\winlogo.exe%NONE%66⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe67⤵
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\SysWOW64\winlogo.exe%NONE%68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1588 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe69⤵PID:448
-
C:\Windows\SysWOW64\winlogo.exe%NONE%70⤵
- Drops file in System32 directory
PID:1012 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe71⤵
- System Location Discovery: System Language Discovery
PID:3872 -
C:\Windows\SysWOW64\winlogo.exe%NONE%72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe73⤵
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\SysWOW64\winlogo.exe%NONE%74⤵
- Drops file in System32 directory
PID:452 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe75⤵
- System Location Discovery: System Language Discovery
PID:2320 -
C:\Windows\SysWOW64\winlogo.exe%NONE%76⤵
- Drops file in System32 directory
PID:2784 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe77⤵
- System Location Discovery: System Language Discovery
PID:3108 -
C:\Windows\SysWOW64\winlogo.exe%NONE%78⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe79⤵
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\SysWOW64\winlogo.exe%NONE%80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4428 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe81⤵
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Windows\SysWOW64\winlogo.exe%NONE%82⤵
- Drops file in System32 directory
PID:2584 -
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe83⤵PID:1576
-
C:\Windows\SysWOW64\winlogo.exe%NONE%84⤵PID:1192
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe85⤵PID:1424
-
C:\Windows\SysWOW64\winlogo.exe%NONE%86⤵PID:4904
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe87⤵PID:3784
-
C:\Windows\SysWOW64\winlogo.exe%NONE%88⤵PID:4316
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe89⤵PID:4444
-
C:\Windows\SysWOW64\winlogo.exe%NONE%90⤵PID:4496
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe91⤵PID:1596
-
C:\Windows\SysWOW64\winlogo.exe%NONE%92⤵PID:4932
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe93⤵PID:1672
-
C:\Windows\SysWOW64\winlogo.exe%NONE%94⤵PID:1564
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe95⤵PID:1016
-
C:\Windows\SysWOW64\winlogo.exe%NONE%96⤵PID:4972
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe97⤵PID:2252
-
C:\Windows\SysWOW64\winlogo.exe%NONE%98⤵PID:4832
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe99⤵PID:1444
-
C:\Windows\SysWOW64\winlogo.exe%NONE%100⤵PID:5080
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe101⤵PID:5112
-
C:\Windows\SysWOW64\winlogo.exe%NONE%102⤵PID:628
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe103⤵PID:4812
-
C:\Windows\SysWOW64\winlogo.exe%NONE%104⤵PID:2148
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe105⤵PID:456
-
C:\Windows\SysWOW64\winlogo.exe%NONE%106⤵PID:2072
-
C:\Windows\SysWOW64\winlogo.exeC:\Windows\system32\winlogo.exe107⤵PID:2840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
49KB
MD5e20be673c779693371329d7278b9dcf5
SHA1bc2d40d138a8fa9c75994eca291e9f02e9fcde49
SHA256b3b252002e374b300d425905213589f669702429da2ce1cfe530b53c9832bba7
SHA5125fcdcacea547c336460f3a11003cdc3c3942b8754147c2e4c719b731897cd0c3ff809b84cf7491f24928889c33dec55181fd7bae4e4a2868479787dcd3cdfd95