Analysis
-
max time kernel
45s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 02:59
Static task
static1
Behavioral task
behavioral1
Sample
ea765260c975618896c278e32ca46a18_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ea765260c975618896c278e32ca46a18_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea765260c975618896c278e32ca46a18_JaffaCakes118.exe
-
Size
45KB
-
MD5
ea765260c975618896c278e32ca46a18
-
SHA1
5b57e2a51b208253c9c9c1634e08ed55995dafdc
-
SHA256
aeecf05ef9b20d0ba0ed0fed299d5c07161e4d35daab807a714372da90cee5db
-
SHA512
5b94aae419f88379fd2029292e7643cd558f897cf552cf5e9c8a2d7f0f8cb6b77b91f2e750447e99e09eb1b03b2d858653d8e3f4985b73f1762fcbf272dda2ed
-
SSDEEP
768:+DI8ys6q0TwnbyqVcxwjygB2dQ0t95h/EkkVuawz+ytXAKhhu+Bp:+Dk1zwb83gB2qsZkAVJhNp
Malware Config
Signatures
-
Drops file in Drivers directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe File opened for modification C:\Windows\system32\drivers\etc\hosts windowsmsnlive.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation ea765260c975618896c278e32ca46a18_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe Key value queried \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Control Panel\International\Geo\Nation windowsmsnlive.exe -
Executes dropped EXE 64 IoCs
pid Process 1576 windowsmsnlive.exe 2360 windowsmsnlive.exe 3264 windowsmsnlive.exe 4692 windowsmsnlive.exe 1912 windowsmsnlive.exe 4460 windowsmsnlive.exe 4976 windowsmsnlive.exe 1076 windowsmsnlive.exe 4148 windowsmsnlive.exe 2056 windowsmsnlive.exe 3912 windowsmsnlive.exe 3836 windowsmsnlive.exe 2084 windowsmsnlive.exe 4584 windowsmsnlive.exe 4072 windowsmsnlive.exe 1512 windowsmsnlive.exe 3644 windowsmsnlive.exe 3652 windowsmsnlive.exe 3240 windowsmsnlive.exe 4412 windowsmsnlive.exe 3056 windowsmsnlive.exe 1424 windowsmsnlive.exe 392 windowsmsnlive.exe 3040 windowsmsnlive.exe 1296 windowsmsnlive.exe 732 windowsmsnlive.exe 1764 windowsmsnlive.exe 4984 windowsmsnlive.exe 1448 windowsmsnlive.exe 3496 windowsmsnlive.exe 3664 windowsmsnlive.exe 4640 windowsmsnlive.exe 4456 windowsmsnlive.exe 1296 windowsmsnlive.exe 436 windowsmsnlive.exe 716 windowsmsnlive.exe 3396 windowsmsnlive.exe 1168 windowsmsnlive.exe 3000 windowsmsnlive.exe 2376 windowsmsnlive.exe 3668 windowsmsnlive.exe 1892 windowsmsnlive.exe 824 windowsmsnlive.exe 1920 windowsmsnlive.exe 2824 windowsmsnlive.exe 3236 windowsmsnlive.exe 4352 windowsmsnlive.exe 2468 windowsmsnlive.exe 2072 windowsmsnlive.exe 3724 windowsmsnlive.exe 4736 windowsmsnlive.exe 1716 windowsmsnlive.exe 3568 windowsmsnlive.exe 1220 windowsmsnlive.exe 4672 windowsmsnlive.exe 4972 windowsmsnlive.exe 1252 windowsmsnlive.exe 4048 windowsmsnlive.exe 624 windowsmsnlive.exe 5076 windowsmsnlive.exe 3376 windowsmsnlive.exe 2164 windowsmsnlive.exe 5048 windowsmsnlive.exe 1680 windowsmsnlive.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" ea765260c975618896c278e32ca46a18_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Messenger Live Startup = "windowsmsnlive.exe" windowsmsnlive.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe ea765260c975618896c278e32ca46a18_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File opened for modification C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe File created C:\Windows\SysWOW64\windowsmsnlive.exe windowsmsnlive.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3912 set thread context of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 1576 set thread context of 2360 1576 windowsmsnlive.exe 92 PID 3264 set thread context of 4692 3264 windowsmsnlive.exe 104 PID 1912 set thread context of 4460 1912 windowsmsnlive.exe 114 PID 4976 set thread context of 1076 4976 windowsmsnlive.exe 126 PID 4148 set thread context of 2056 4148 windowsmsnlive.exe 140 PID 3912 set thread context of 3836 3912 windowsmsnlive.exe 154 PID 2084 set thread context of 4584 2084 windowsmsnlive.exe 165 PID 4072 set thread context of 1512 4072 windowsmsnlive.exe 178 PID 3644 set thread context of 3652 3644 windowsmsnlive.exe 190 PID 3240 set thread context of 4412 3240 windowsmsnlive.exe 202 PID 3056 set thread context of 1424 3056 windowsmsnlive.exe 502 PID 392 set thread context of 3040 392 windowsmsnlive.exe 226 PID 1296 set thread context of 732 1296 windowsmsnlive.exe 239 PID 1764 set thread context of 4984 1764 windowsmsnlive.exe 247 PID 1448 set thread context of 3496 1448 windowsmsnlive.exe 264 PID 3664 set thread context of 4640 3664 windowsmsnlive.exe 276 PID 4456 set thread context of 1296 4456 windowsmsnlive.exe 288 PID 436 set thread context of 716 436 windowsmsnlive.exe 771 PID 3396 set thread context of 1168 3396 windowsmsnlive.exe 313 PID 3000 set thread context of 2376 3000 windowsmsnlive.exe 322 PID 3668 set thread context of 1892 3668 windowsmsnlive.exe 337 PID 824 set thread context of 1920 824 windowsmsnlive.exe 964 PID 2824 set thread context of 3236 2824 windowsmsnlive.exe 361 PID 4352 set thread context of 2468 4352 windowsmsnlive.exe 810 PID 2072 set thread context of 3724 2072 windowsmsnlive.exe 385 PID 4736 set thread context of 1716 4736 windowsmsnlive.exe 1305 PID 3568 set thread context of 1220 3568 windowsmsnlive.exe 411 PID 4672 set thread context of 4972 4672 windowsmsnlive.exe 420 PID 1252 set thread context of 4048 1252 windowsmsnlive.exe 586 PID 624 set thread context of 5076 624 windowsmsnlive.exe 447 PID 3376 set thread context of 2164 3376 windowsmsnlive.exe 455 PID 5048 set thread context of 1680 5048 windowsmsnlive.exe 470 PID 2684 set thread context of 4312 2684 windowsmsnlive.exe 483 PID 4608 set thread context of 3664 4608 windowsmsnlive.exe 493 PID 4556 set thread context of 4072 4556 windowsmsnlive.exe 1292 PID 4588 set thread context of 1264 4588 windowsmsnlive.exe 518 PID 1920 set thread context of 3320 1920 windowsmsnlive.exe 531 PID 2196 set thread context of 3280 2196 windowsmsnlive.exe 541 PID 3088 set thread context of 3632 3088 windowsmsnlive.exe 1676 PID 2172 set thread context of 5056 2172 windowsmsnlive.exe 1702 PID 5048 set thread context of 1480 5048 windowsmsnlive.exe 579 PID 4424 set thread context of 3948 4424 windowsmsnlive.exe 758 PID 4716 set thread context of 4024 4716 windowsmsnlive.exe 1915 PID 4712 set thread context of 4696 4712 windowsmsnlive.exe 612 PID 1340 set thread context of 1716 1340 windowsmsnlive.exe 1769 PID 1764 set thread context of 2032 1764 windowsmsnlive.exe 1970 PID 3912 set thread context of 4124 3912 windowsmsnlive.exe 651 PID 1132 set thread context of 4084 1132 windowsmsnlive.exe 1954 PID 4656 set thread context of 4456 4656 windowsmsnlive.exe 675 PID 2664 set thread context of 2476 2664 windowsmsnlive.exe 687 PID 212 set thread context of 4968 212 windowsmsnlive.exe 699 PID 4436 set thread context of 2764 4436 windowsmsnlive.exe 711 PID 1776 set thread context of 4548 1776 windowsmsnlive.exe 720 PID 1516 set thread context of 5116 1516 windowsmsnlive.exe 1806 PID 2028 set thread context of 4168 2028 windowsmsnlive.exe 2319 PID 324 set thread context of 3948 324 windowsmsnlive.exe 758 PID 1888 set thread context of 4580 1888 windowsmsnlive.exe 770 PID 3660 set thread context of 3104 3660 windowsmsnlive.exe 2419 PID 4236 set thread context of 1292 4236 windowsmsnlive.exe 2463 PID 3972 set thread context of 3672 3972 windowsmsnlive.exe 2429 PID 4648 set thread context of 2772 4648 windowsmsnlive.exe 1157 PID 3208 set thread context of 3328 3208 windowsmsnlive.exe 831 PID 4336 set thread context of 4672 4336 windowsmsnlive.exe 1349 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CMD.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windowsmsnlive.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ ea765260c975618896c278e32ca46a18_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ windowsmsnlive.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe Token: SeIncBasePriorityPrivilege 2360 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4692 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4460 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1076 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2056 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3836 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4584 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1512 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3652 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4412 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1424 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3040 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 732 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4984 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3496 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4640 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1296 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 716 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1168 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2376 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1892 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1920 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3236 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2468 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3724 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1716 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1220 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4972 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4048 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 5076 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2164 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1680 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4312 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3664 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4072 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1264 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3320 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3280 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3632 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 5056 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1480 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3948 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4024 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4696 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1716 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2032 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4124 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4084 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4456 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2476 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4968 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2764 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4548 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 5116 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4168 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3948 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4580 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3104 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 1292 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3672 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 2772 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 3328 windowsmsnlive.exe Token: SeIncBasePriorityPrivilege 4672 windowsmsnlive.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 3912 wrote to memory of 1496 3912 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 81 PID 1496 wrote to memory of 1576 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 82 PID 1496 wrote to memory of 1576 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 82 PID 1496 wrote to memory of 1576 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 82 PID 1496 wrote to memory of 2084 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 83 PID 1496 wrote to memory of 2084 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 83 PID 1496 wrote to memory of 2084 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 83 PID 1496 wrote to memory of 1580 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 84 PID 1496 wrote to memory of 1580 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 84 PID 1496 wrote to memory of 1580 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 84 PID 1496 wrote to memory of 5036 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 85 PID 1496 wrote to memory of 5036 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 85 PID 1496 wrote to memory of 5036 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 85 PID 1496 wrote to memory of 1372 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 86 PID 1496 wrote to memory of 1372 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 86 PID 1496 wrote to memory of 1372 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 86 PID 1496 wrote to memory of 1668 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 88 PID 1496 wrote to memory of 1668 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 88 PID 1496 wrote to memory of 1668 1496 ea765260c975618896c278e32ca46a18_JaffaCakes118.exe 88 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 1576 wrote to memory of 2360 1576 windowsmsnlive.exe 92 PID 2360 wrote to memory of 3264 2360 windowsmsnlive.exe 94 PID 2360 wrote to memory of 3264 2360 windowsmsnlive.exe 94 PID 2360 wrote to memory of 3264 2360 windowsmsnlive.exe 94 PID 2360 wrote to memory of 4548 2360 windowsmsnlive.exe 95 PID 2360 wrote to memory of 4548 2360 windowsmsnlive.exe 95 PID 2360 wrote to memory of 4548 2360 windowsmsnlive.exe 95 PID 2360 wrote to memory of 3752 2360 windowsmsnlive.exe 96 PID 2360 wrote to memory of 3752 2360 windowsmsnlive.exe 96 PID 2360 wrote to memory of 3752 2360 windowsmsnlive.exe 96 PID 2360 wrote to memory of 1536 2360 windowsmsnlive.exe 97 PID 2360 wrote to memory of 1536 2360 windowsmsnlive.exe 97 PID 2360 wrote to memory of 1536 2360 windowsmsnlive.exe 97 PID 2360 wrote to memory of 2708 2360 windowsmsnlive.exe 98 PID 2360 wrote to memory of 2708 2360 windowsmsnlive.exe 98 PID 2360 wrote to memory of 2708 2360 windowsmsnlive.exe 98 PID 2360 wrote to memory of 952 2360 windowsmsnlive.exe 99 PID 2360 wrote to memory of 952 2360 windowsmsnlive.exe 99 PID 2360 wrote to memory of 952 2360 windowsmsnlive.exe 99 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 3264 wrote to memory of 4692 3264 windowsmsnlive.exe 104 PID 4692 wrote to memory of 1912 4692 windowsmsnlive.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea765260c975618896c278e32ca46a18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea765260c975618896c278e32ca46a18_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\AppData\Local\Temp\ea765260c975618896c278e32ca46a18_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea765260c975618896c278e32ca46a18_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3264 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1912 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4460 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4976 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"10⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1076 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4148 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2056 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3912 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"14⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3836 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2084 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4584 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4072 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"18⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1512 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3644 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"20⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3652 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3240 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4412 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3056 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1424 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:392 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3040 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1296 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"28⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:732 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1764 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"30⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1448 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"32⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3496 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3664 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"34⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4640 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4456 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"36⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1296 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:436 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:716 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3396 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"40⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1168 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3000 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2376 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3668 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"44⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1892 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:824 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"46⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3236 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4352 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:2468 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2072 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3724 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4736 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"54⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3568 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"56⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1220 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4672 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"58⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4972 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1252 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4048 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:624 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"62⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5076 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3376 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"64⤵
- Drops file in Drivers directory
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2164 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5048 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"66⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1680 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"67⤵
- Suspicious use of SetThreadContext
PID:2684 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"68⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4312 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"69⤵
- Suspicious use of SetThreadContext
PID:4608 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"70⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3664 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"71⤵
- Suspicious use of SetThreadContext
PID:4556 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"72⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:4072 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"73⤵
- Suspicious use of SetThreadContext
PID:4588 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"74⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1264 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"75⤵
- Suspicious use of SetThreadContext
PID:1920 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"76⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3320 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"77⤵
- Suspicious use of SetThreadContext
PID:2196 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"78⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:3280 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"79⤵
- Suspicious use of SetThreadContext
PID:3088 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"80⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3632 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"81⤵
- Suspicious use of SetThreadContext
PID:2172 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"82⤵
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5056 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"83⤵
- Suspicious use of SetThreadContext
PID:5048 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"84⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"85⤵
- Suspicious use of SetThreadContext
PID:4424 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"86⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"87⤵
- Suspicious use of SetThreadContext
PID:4716 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"88⤵
- Drops file in Drivers directory
- Checks computer location settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4024 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"89⤵
- Suspicious use of SetThreadContext
PID:4712 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"90⤵
- Drops file in Drivers directory
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4696 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"91⤵
- Suspicious use of SetThreadContext
PID:1340 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"92⤵
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1716 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"93⤵
- Suspicious use of SetThreadContext
PID:1764 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"94⤵
- Drops file in Drivers directory
- Suspicious use of AdjustPrivilegeToken
PID:2032 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"95⤵
- Suspicious use of SetThreadContext
PID:3912 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"96⤵
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"97⤵
- Suspicious use of SetThreadContext
PID:1132 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"98⤵
- Drops file in Drivers directory
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4084 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"99⤵
- Suspicious use of SetThreadContext
PID:4656 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"100⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
PID:4456 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"101⤵
- Suspicious use of SetThreadContext
PID:2664 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"102⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2476 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"103⤵
- Suspicious use of SetThreadContext
PID:212 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"104⤵
- Drops file in Drivers directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:4968 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"105⤵
- Suspicious use of SetThreadContext
PID:4436 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"106⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:2764 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"107⤵
- Suspicious use of SetThreadContext
PID:1776 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"108⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4548 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"109⤵
- Suspicious use of SetThreadContext
PID:1516 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"110⤵
- Drops file in Drivers directory
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:5116 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"112⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4168 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"113⤵
- Suspicious use of SetThreadContext
PID:324 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"114⤵
- Drops file in Drivers directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3948 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"115⤵
- Suspicious use of SetThreadContext
PID:1888 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"116⤵
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:4580 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"117⤵
- Suspicious use of SetThreadContext
PID:3660 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"118⤵
- Drops file in Drivers directory
- Checks computer location settings
- Suspicious use of AdjustPrivilegeToken
PID:3104 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"119⤵
- Suspicious use of SetThreadContext
PID:4236 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"120⤵
- Drops file in Drivers directory
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1292 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\system32\windowsmsnlive.exe"121⤵
- Suspicious use of SetThreadContext
PID:3972 -
C:\Windows\SysWOW64\windowsmsnlive.exe"C:\Windows\SysWOW64\windowsmsnlive.exe"122⤵
- Drops file in Drivers directory
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3672
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-