Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
19/09/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe
-
Size
7KB
-
MD5
ea780905612f929a37c2dd655a8ddd04
-
SHA1
f2f082ac9eb60134e46a5e1e2d8edc3d29863974
-
SHA256
d532877314c51b00e787158ef2ea183e3ba8cbd0bc0417904e81ecdd541a0b44
-
SHA512
c348cc5caa85a52e8ee6ec14b7039e2114b34e26e92494460d1fcd38c3d97458413afda18b3930bb7139baf2202d3d51ba8ad0be2bf8748efc5391338d23fac7
-
SSDEEP
96:JgrLJIPQR9zt91GB6XfQdJi9Ypp91JaJsGjFP3nm6ZuiVbry3VBvmD8Zao:EXR9zNX9YXda95fuCAB4Wao
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 4984 nwizAsktao.exe 4044 nwizAsktao.exe 4392 nwizAsktao.exe 4700 nwizAsktao.exe 3284 nwizAsktao.exe 3252 nwizAsktao.exe 4292 nwizAsktao.exe 2260 nwizAsktao.exe 3548 nwizAsktao.exe 1164 nwizAsktao.exe 2432 nwizAsktao.exe 392 nwizAsktao.exe 3544 nwizAsktao.exe 4200 nwizAsktao.exe 3196 nwizAsktao.exe 2300 nwizAsktao.exe 4800 nwizAsktao.exe 4140 nwizAsktao.exe 2512 nwizAsktao.exe 1720 nwizAsktao.exe 548 nwizAsktao.exe 2464 nwizAsktao.exe 2940 nwizAsktao.exe 3824 nwizAsktao.exe 3136 nwizAsktao.exe 4708 nwizAsktao.exe 1852 nwizAsktao.exe 5108 nwizAsktao.exe 2420 nwizAsktao.exe 3396 nwizAsktao.exe 1240 nwizAsktao.exe 1076 nwizAsktao.exe 4612 nwizAsktao.exe 1480 nwizAsktao.exe 1888 nwizAsktao.exe 3328 nwizAsktao.exe 5024 nwizAsktao.exe 4140 nwizAsktao.exe 2512 nwizAsktao.exe 2280 nwizAsktao.exe 548 nwizAsktao.exe 4392 nwizAsktao.exe 2940 nwizAsktao.exe 708 nwizAsktao.exe 3136 nwizAsktao.exe 4708 nwizAsktao.exe 1852 nwizAsktao.exe 3980 nwizAsktao.exe 540 nwizAsktao.exe 1176 nwizAsktao.exe 3568 nwizAsktao.exe 2724 nwizAsktao.exe 4420 nwizAsktao.exe 1056 nwizAsktao.exe 5116 nwizAsktao.exe 4448 nwizAsktao.exe 1888 nwizAsktao.exe 4384 nwizAsktao.exe 2388 nwizAsktao.exe 4192 nwizAsktao.exe 3300 nwizAsktao.exe 4044 nwizAsktao.exe 2460 nwizAsktao.exe 3452 nwizAsktao.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File opened for modification C:\Windows\SysWOW64\nwizAsktao.exe ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe File created C:\Windows\SysWOW64\nwizAsktao.exe nwizAsktao.exe -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language nwizAsktao.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4984 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4044 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4392 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 4700 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3284 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 3252 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe 4292 nwizAsktao.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4192 wrote to memory of 4984 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 82 PID 4192 wrote to memory of 4984 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 82 PID 4192 wrote to memory of 4984 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 82 PID 4192 wrote to memory of 4072 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 83 PID 4192 wrote to memory of 4072 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 83 PID 4192 wrote to memory of 4072 4192 ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe 83 PID 4984 wrote to memory of 4044 4984 nwizAsktao.exe 85 PID 4984 wrote to memory of 4044 4984 nwizAsktao.exe 85 PID 4984 wrote to memory of 4044 4984 nwizAsktao.exe 85 PID 4984 wrote to memory of 2144 4984 nwizAsktao.exe 86 PID 4984 wrote to memory of 2144 4984 nwizAsktao.exe 86 PID 4984 wrote to memory of 2144 4984 nwizAsktao.exe 86 PID 4044 wrote to memory of 4392 4044 nwizAsktao.exe 90 PID 4044 wrote to memory of 4392 4044 nwizAsktao.exe 90 PID 4044 wrote to memory of 4392 4044 nwizAsktao.exe 90 PID 4044 wrote to memory of 5048 4044 nwizAsktao.exe 91 PID 4044 wrote to memory of 5048 4044 nwizAsktao.exe 91 PID 4044 wrote to memory of 5048 4044 nwizAsktao.exe 91 PID 4392 wrote to memory of 4700 4392 nwizAsktao.exe 95 PID 4392 wrote to memory of 4700 4392 nwizAsktao.exe 95 PID 4392 wrote to memory of 4700 4392 nwizAsktao.exe 95 PID 4392 wrote to memory of 3608 4392 nwizAsktao.exe 96 PID 4392 wrote to memory of 3608 4392 nwizAsktao.exe 96 PID 4392 wrote to memory of 3608 4392 nwizAsktao.exe 96 PID 4700 wrote to memory of 3284 4700 nwizAsktao.exe 98 PID 4700 wrote to memory of 3284 4700 nwizAsktao.exe 98 PID 4700 wrote to memory of 3284 4700 nwizAsktao.exe 98 PID 4700 wrote to memory of 3024 4700 nwizAsktao.exe 99 PID 4700 wrote to memory of 3024 4700 nwizAsktao.exe 99 PID 4700 wrote to memory of 3024 4700 nwizAsktao.exe 99 PID 3284 wrote to memory of 3252 3284 nwizAsktao.exe 101 PID 3284 wrote to memory of 3252 3284 nwizAsktao.exe 101 PID 3284 wrote to memory of 3252 3284 nwizAsktao.exe 101 PID 3284 wrote to memory of 2740 3284 nwizAsktao.exe 102 PID 3284 wrote to memory of 2740 3284 nwizAsktao.exe 102 PID 3284 wrote to memory of 2740 3284 nwizAsktao.exe 102 PID 3252 wrote to memory of 4292 3252 nwizAsktao.exe 105 PID 3252 wrote to memory of 4292 3252 nwizAsktao.exe 105 PID 3252 wrote to memory of 4292 3252 nwizAsktao.exe 105 PID 3252 wrote to memory of 4156 3252 nwizAsktao.exe 106 PID 3252 wrote to memory of 4156 3252 nwizAsktao.exe 106 PID 3252 wrote to memory of 4156 3252 nwizAsktao.exe 106 PID 4292 wrote to memory of 2260 4292 nwizAsktao.exe 108 PID 4292 wrote to memory of 2260 4292 nwizAsktao.exe 108 PID 4292 wrote to memory of 2260 4292 nwizAsktao.exe 108 PID 4292 wrote to memory of 5076 4292 nwizAsktao.exe 109 PID 4292 wrote to memory of 5076 4292 nwizAsktao.exe 109 PID 4292 wrote to memory of 5076 4292 nwizAsktao.exe 109 PID 2260 wrote to memory of 3548 2260 nwizAsktao.exe 111 PID 2260 wrote to memory of 3548 2260 nwizAsktao.exe 111 PID 2260 wrote to memory of 3548 2260 nwizAsktao.exe 111 PID 2260 wrote to memory of 2152 2260 nwizAsktao.exe 112 PID 2260 wrote to memory of 2152 2260 nwizAsktao.exe 112 PID 2260 wrote to memory of 2152 2260 nwizAsktao.exe 112 PID 3548 wrote to memory of 1164 3548 nwizAsktao.exe 116 PID 3548 wrote to memory of 1164 3548 nwizAsktao.exe 116 PID 3548 wrote to memory of 1164 3548 nwizAsktao.exe 116 PID 3548 wrote to memory of 4076 3548 nwizAsktao.exe 117 PID 3548 wrote to memory of 4076 3548 nwizAsktao.exe 117 PID 3548 wrote to memory of 4076 3548 nwizAsktao.exe 117 PID 1164 wrote to memory of 2432 1164 nwizAsktao.exe 119 PID 1164 wrote to memory of 2432 1164 nwizAsktao.exe 119 PID 1164 wrote to memory of 2432 1164 nwizAsktao.exe 119 PID 1164 wrote to memory of 3644 1164 nwizAsktao.exe 120
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ea780905612f929a37c2dd655a8ddd04_JaffaCakes118.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4192 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe3⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4392 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe5⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4700 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe6⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3284 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4292 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe9⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1164 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe12⤵
- Executes dropped EXE
PID:2432 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe13⤵
- Executes dropped EXE
PID:392 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3544 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4200 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe16⤵
- Executes dropped EXE
PID:3196 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe18⤵
- Executes dropped EXE
PID:4800 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe19⤵
- Executes dropped EXE
PID:4140 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe20⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe21⤵
- Executes dropped EXE
PID:1720 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe22⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2464 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe24⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2940 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe25⤵
- Executes dropped EXE
PID:3824 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe26⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3136 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe28⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe30⤵
- Executes dropped EXE
PID:2420 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe32⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1240 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe33⤵
- Executes dropped EXE
PID:1076 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4612 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe35⤵
- Executes dropped EXE
PID:1480 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe36⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3328 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe38⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:5024 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe39⤵
- Executes dropped EXE
PID:4140 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe41⤵
- Executes dropped EXE
PID:2280 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe43⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4392 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe44⤵
- Executes dropped EXE
PID:2940 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:708 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3136 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe47⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4708 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe48⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1852 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3980 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe50⤵
- Executes dropped EXE
PID:540 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe51⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1176 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe52⤵
- Executes dropped EXE
PID:3568 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe53⤵
- Executes dropped EXE
PID:2724 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe54⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4420 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe55⤵
- Executes dropped EXE
PID:1056 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe56⤵
- Executes dropped EXE
PID:5116 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe57⤵
- Executes dropped EXE
PID:4448 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe58⤵
- Executes dropped EXE
PID:1888 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe59⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4384 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe60⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4192 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3300 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe63⤵
- Executes dropped EXE
PID:4044 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe64⤵
- Executes dropped EXE
PID:2460 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe65⤵
- Executes dropped EXE
PID:3452 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe66⤵
- Drops file in System32 directory
PID:4444 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe67⤵
- Drops file in System32 directory
PID:3120 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3912 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe69⤵
- Drops file in System32 directory
PID:4400 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe70⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:324 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe71⤵PID:2056
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe72⤵
- System Location Discovery: System Language Discovery
PID:1352 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe73⤵PID:4896
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe74⤵
- Drops file in System32 directory
PID:2984 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe75⤵PID:2156
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe76⤵
- Drops file in System32 directory
PID:468 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe77⤵PID:448
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe78⤵
- Drops file in System32 directory
PID:4376 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe79⤵PID:4432
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe80⤵PID:2976
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe81⤵
- Drops file in System32 directory
PID:4364 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe82⤵
- System Location Discovery: System Language Discovery
PID:3020 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe83⤵
- Drops file in System32 directory
PID:4464 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe84⤵
- Drops file in System32 directory
PID:652 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe85⤵
- Drops file in System32 directory
PID:5048 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe86⤵PID:412
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe87⤵PID:3300
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe88⤵PID:3960
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe89⤵PID:3232
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe90⤵PID:2296
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe91⤵PID:4156
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe92⤵
- Drops file in System32 directory
PID:4164 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe93⤵
- Drops file in System32 directory
PID:3912 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe94⤵
- Drops file in System32 directory
PID:2476 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe95⤵
- Drops file in System32 directory
PID:3176 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe96⤵PID:2576
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe97⤵
- Drops file in System32 directory
PID:3692 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe98⤵PID:4768
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe99⤵
- Drops file in System32 directory
PID:4348 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe100⤵PID:2668
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe101⤵PID:3924
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe102⤵PID:3544
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe103⤵PID:5116
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe104⤵
- Drops file in System32 directory
PID:2416 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe105⤵
- Drops file in System32 directory
PID:1584 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe106⤵PID:2844
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe107⤵PID:2412
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe108⤵
- Drops file in System32 directory
PID:3292 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe109⤵
- System Location Discovery: System Language Discovery
PID:4140 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe110⤵PID:4892
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe111⤵
- Drops file in System32 directory
PID:4192 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe112⤵PID:4732
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe113⤵PID:4392
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe114⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1124 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe115⤵PID:3024
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe116⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3824 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe117⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe118⤵
- Drops file in System32 directory
PID:2560 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe119⤵
- Drops file in System32 directory
PID:4164 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe120⤵PID:3132
-
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe121⤵
- Drops file in System32 directory
PID:64 -
C:\Windows\SysWOW64\nwizAsktao.exeC:\Windows\system32\nwizAsktao.exe122⤵
- Drops file in System32 directory
PID:2576
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-