Analysis
-
max time kernel
17s -
max time network
141s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
30-09-2024 13:14
Behavioral task
behavioral1
Sample
0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
0184268ed51034fb5bb309a06c23cc92
-
SHA1
94a52954c57fcca249166ad9d29bbccd91c7f704
-
SHA256
1dc67f1ef244d1092902a9a3a14d570c78c407ea1d22b03c5ed64fea810ab5b0
-
SHA512
9ea7e7154c863ca3138f8bb0de86a8ba07adf83c10876fe5ae796a26e2220e8a8cdd531855c14bc08ba41cb504d4ed5a2a121637441d72e436c377648368426a
-
SSDEEP
24576:Wi8ZjYCw0HTQ5zDAT58ZGftq7AAO3vZpq1U3WgQqPJTRWAl7i7TyCQhkUlDCDoxQ:RMYCwUTQ5/ZGE0Rpj3YO37iK1lWDczju
Malware Config
Signatures
-
Ardamax main executable 2 IoCs
resource yara_rule behavioral2/files/0x0007000000023462-17.dat family_ardamax behavioral2/files/0x0007000000023464-61.dat family_ardamax -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe Key value queried \REGISTRY\USER\S-1-5-21-2392887640-1187051047-2909758433-1000\Control Panel\International\Geo\Nation Silkroad.exe -
Executes dropped EXE 64 IoCs
pid Process 4188 silkroad.exe 4948 silkroad.exe 4900 system32GDHL.exe 2444 Silkroad.exe 4608 system32GDHL.exe 2020 Silkroad.exe 3120 system32GDHL.exe 3992 Silkroad.exe 3880 system32GDHL.exe 3936 Silkroad.exe 4196 system32GDHL.exe 1600 Silkroad.exe 2492 system32GDHL.exe 3688 Silkroad.exe 1536 system32GDHL.exe 3400 Silkroad.exe 4444 system32GDHL.exe 3512 Silkroad.exe 2636 system32GDHL.exe 2860 Silkroad.exe 1208 system32GDHL.exe 1964 Silkroad.exe 1488 system32GDHL.exe 920 Silkroad.exe 2344 system32GDHL.exe 368 Silkroad.exe 2892 system32GDHL.exe 2744 Silkroad.exe 2920 system32GDHL.exe 1376 Silkroad.exe 2096 system32GDHL.exe 4336 Silkroad.exe 788 system32GDHL.exe 2240 Silkroad.exe 212 system32GDHL.exe 232 system32GDHL.exe 3588 Silkroad.exe 4288 Silkroad.exe 1840 system32GDHL.exe 3416 Silkroad.exe 3476 system32GDHL.exe 2064 Silkroad.exe 4292 system32GDHL.exe 1944 system32GDHL.exe 2656 Silkroad.exe 4076 Silkroad.exe 3548 system32GDHL.exe 4260 Silkroad.exe 2752 system32GDHL.exe 2528 Silkroad.exe 4596 system32GDHL.exe 1536 Silkroad.exe 5060 system32GDHL.exe 3852 Silkroad.exe 3420 system32GDHL.exe 876 Silkroad.exe 3896 system32GDHL.exe 1664 Silkroad.exe 4864 system32GDHL.exe 2576 Silkroad.exe 2860 system32GDHL.exe 728 Silkroad.exe 512 system32GDHL.exe 1264 system32GDHL.exe -
Loads dropped DLL 64 IoCs
pid Process 4188 silkroad.exe 4948 silkroad.exe 2444 Silkroad.exe 4900 system32GDHL.exe 4948 silkroad.exe 4948 silkroad.exe 4900 system32GDHL.exe 4900 system32GDHL.exe 4948 silkroad.exe 4948 silkroad.exe 2020 Silkroad.exe 3992 Silkroad.exe 3936 Silkroad.exe 1600 Silkroad.exe 3688 Silkroad.exe 3400 Silkroad.exe 3512 Silkroad.exe 2860 Silkroad.exe 1964 Silkroad.exe 920 Silkroad.exe 368 Silkroad.exe 2892 system32GDHL.exe 2892 system32GDHL.exe 2892 system32GDHL.exe 2744 Silkroad.exe 1376 Silkroad.exe 4336 Silkroad.exe 2240 Silkroad.exe 212 system32GDHL.exe 212 system32GDHL.exe 212 system32GDHL.exe 3588 Silkroad.exe 4288 Silkroad.exe 3416 Silkroad.exe 2064 Silkroad.exe 2656 Silkroad.exe 4076 Silkroad.exe 3548 system32GDHL.exe 3548 system32GDHL.exe 3548 system32GDHL.exe 2656 Silkroad.exe 2656 Silkroad.exe 2656 Silkroad.exe 2656 Silkroad.exe 4076 Silkroad.exe 4076 Silkroad.exe 4076 Silkroad.exe 4076 Silkroad.exe 4260 Silkroad.exe 2528 Silkroad.exe 1536 Silkroad.exe 3852 Silkroad.exe 876 Silkroad.exe 1664 Silkroad.exe 3896 system32GDHL.exe 876 Silkroad.exe 876 Silkroad.exe 3896 system32GDHL.exe 3896 system32GDHL.exe 2576 Silkroad.exe 728 Silkroad.exe 1264 system32GDHL.exe 512 system32GDHL.exe 2848 Silkroad.exe -
Adds Run key to start application 2 TTPs 34 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\system32GDHL Agent = "C:\\Windows\\system32GDHL.exe" system32GDHL.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32AKV.exe Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File opened for modification C:\Windows\system32GDHL.001 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File created C:\Windows\system32GDHL.007 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.006 Silkroad.exe File created C:\Windows\system32GDHL.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe File opened for modification C:\Windows\system32AKV.exe Silkroad.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 64 IoCs
pid pid_target Process procid_target 512 4900 WerFault.exe 86 1792 2892 WerFault.exe 113 4280 212 WerFault.exe 123 1512 3548 WerFault.exe 137 4364 3896 WerFault.exe 149 2988 1264 WerFault.exe 158 724 3048 WerFault.exe 166 4292 3588 WerFault.exe 173 4372 3452 WerFault.exe 182 1152 1964 WerFault.exe 200 3964 1168 WerFault.exe 210 4800 4292 WerFault.exe 223 1584 824 WerFault.exe 235 2920 2712 WerFault.exe 245 2692 4804 WerFault.exe 259 1984 3660 WerFault.exe 277 552 3896 WerFault.exe 286 2200 920 WerFault.exe 295 5116 3636 WerFault.exe 307 4444 2972 WerFault.exe 316 3008 2736 WerFault.exe 325 676 2100 WerFault.exe 333 384 4984 WerFault.exe 343 3636 1136 WerFault.exe 354 4224 856 WerFault.exe 363 2912 4864 WerFault.exe 371 4040 4232 WerFault.exe 381 2852 2828 WerFault.exe 391 2648 4124 WerFault.exe 401 3828 2616 WerFault.exe 411 1076 2736 WerFault.exe 421 1148 2824 WerFault.exe 433 4124 3976 WerFault.exe 449 4760 5084 WerFault.exe 459 3876 2296 WerFault.exe 475 4884 2264 WerFault.exe 483 680 1140 WerFault.exe 492 2836 4484 WerFault.exe 503 4952 2980 WerFault.exe 517 1608 3856 WerFault.exe 525 1516 4188 WerFault.exe 535 3404 4476 WerFault.exe 543 3212 4064 WerFault.exe 552 3928 632 WerFault.exe 563 2976 4800 WerFault.exe 581 1864 4600 WerFault.exe 588 4244 3872 WerFault.exe 596 2892 3468 WerFault.exe 606 3028 4988 WerFault.exe 617 5004 716 WerFault.exe 630 2332 1944 WerFault.exe 639 3512 2144 WerFault.exe 656 3324 3016 WerFault.exe 670 1092 212 WerFault.exe 681 1360 1136 WerFault.exe 690 2532 3424 WerFault.exe 699 2952 2408 WerFault.exe 716 1880 2240 WerFault.exe 730 3120 1656 WerFault.exe 745 1008 2892 WerFault.exe 755 4620 1136 WerFault.exe 764 1988 8 WerFault.exe 777 1876 5008 WerFault.exe 788 2648 460 WerFault.exe 795 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Silkroad.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language system32GDHL.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: 33 4900 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4900 system32GDHL.exe Token: 33 2892 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2892 system32GDHL.exe Token: 33 212 system32GDHL.exe Token: SeIncBasePriorityPrivilege 212 system32GDHL.exe Token: 33 3548 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3548 system32GDHL.exe Token: 33 3896 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3896 system32GDHL.exe Token: 33 1264 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1264 system32GDHL.exe Token: 33 3048 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3048 system32GDHL.exe Token: 33 3588 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3588 system32GDHL.exe Token: 33 3452 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3452 system32GDHL.exe Token: 33 1964 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1964 system32GDHL.exe Token: 33 1168 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1168 system32GDHL.exe Token: 33 4292 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4292 system32GDHL.exe Token: 33 824 system32GDHL.exe Token: SeIncBasePriorityPrivilege 824 system32GDHL.exe Token: 33 2712 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2712 system32GDHL.exe Token: 33 4804 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4804 system32GDHL.exe Token: 33 716 system32GDHL.exe Token: SeIncBasePriorityPrivilege 716 system32GDHL.exe Token: 33 3660 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3660 system32GDHL.exe Token: 33 3896 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3896 system32GDHL.exe Token: 33 920 system32GDHL.exe Token: SeIncBasePriorityPrivilege 920 system32GDHL.exe Token: 33 3636 system32GDHL.exe Token: SeIncBasePriorityPrivilege 3636 system32GDHL.exe Token: 33 2972 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2972 system32GDHL.exe Token: 33 2736 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2736 system32GDHL.exe Token: 33 2100 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2100 system32GDHL.exe Token: 33 4984 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4984 system32GDHL.exe Token: 33 1136 system32GDHL.exe Token: SeIncBasePriorityPrivilege 1136 system32GDHL.exe Token: 33 856 system32GDHL.exe Token: SeIncBasePriorityPrivilege 856 system32GDHL.exe Token: 33 4864 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4864 system32GDHL.exe Token: 33 4232 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4232 system32GDHL.exe Token: 33 2828 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2828 system32GDHL.exe Token: 33 4124 system32GDHL.exe Token: SeIncBasePriorityPrivilege 4124 system32GDHL.exe Token: 33 2616 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2616 system32GDHL.exe Token: 33 2736 system32GDHL.exe Token: SeIncBasePriorityPrivilege 2736 system32GDHL.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 4900 system32GDHL.exe 4900 system32GDHL.exe 4900 system32GDHL.exe 4900 system32GDHL.exe 4900 system32GDHL.exe 2892 system32GDHL.exe 2892 system32GDHL.exe 2892 system32GDHL.exe 2892 system32GDHL.exe 2892 system32GDHL.exe 212 system32GDHL.exe 212 system32GDHL.exe 212 system32GDHL.exe 212 system32GDHL.exe 212 system32GDHL.exe 3548 system32GDHL.exe 3548 system32GDHL.exe 3548 system32GDHL.exe 3548 system32GDHL.exe 3548 system32GDHL.exe 3896 system32GDHL.exe 3896 system32GDHL.exe 3896 system32GDHL.exe 3896 system32GDHL.exe 3896 system32GDHL.exe 1264 system32GDHL.exe 1264 system32GDHL.exe 1264 system32GDHL.exe 1264 system32GDHL.exe 1264 system32GDHL.exe 3048 system32GDHL.exe 3048 system32GDHL.exe 3048 system32GDHL.exe 3048 system32GDHL.exe 3048 system32GDHL.exe 3588 system32GDHL.exe 3588 system32GDHL.exe 3588 system32GDHL.exe 3588 system32GDHL.exe 3588 system32GDHL.exe 3452 system32GDHL.exe 3452 system32GDHL.exe 3452 system32GDHL.exe 3452 system32GDHL.exe 3452 system32GDHL.exe 1964 system32GDHL.exe 1964 system32GDHL.exe 1964 system32GDHL.exe 1964 system32GDHL.exe 1964 system32GDHL.exe 1168 system32GDHL.exe 1168 system32GDHL.exe 1168 system32GDHL.exe 1168 system32GDHL.exe 1168 system32GDHL.exe 4292 system32GDHL.exe 4292 system32GDHL.exe 4292 system32GDHL.exe 4292 system32GDHL.exe 4292 system32GDHL.exe 824 system32GDHL.exe 824 system32GDHL.exe 824 system32GDHL.exe 824 system32GDHL.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3192 wrote to memory of 4188 3192 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 84 PID 3192 wrote to memory of 4188 3192 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 84 PID 3192 wrote to memory of 4188 3192 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 84 PID 3192 wrote to memory of 4948 3192 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 85 PID 3192 wrote to memory of 4948 3192 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 85 PID 3192 wrote to memory of 4948 3192 0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe 85 PID 4188 wrote to memory of 4900 4188 silkroad.exe 86 PID 4188 wrote to memory of 4900 4188 silkroad.exe 86 PID 4188 wrote to memory of 4900 4188 silkroad.exe 86 PID 4188 wrote to memory of 2444 4188 silkroad.exe 87 PID 4188 wrote to memory of 2444 4188 silkroad.exe 87 PID 4188 wrote to memory of 2444 4188 silkroad.exe 87 PID 4948 wrote to memory of 4608 4948 silkroad.exe 88 PID 4948 wrote to memory of 4608 4948 silkroad.exe 88 PID 4948 wrote to memory of 4608 4948 silkroad.exe 88 PID 4948 wrote to memory of 2020 4948 silkroad.exe 89 PID 4948 wrote to memory of 2020 4948 silkroad.exe 89 PID 4948 wrote to memory of 2020 4948 silkroad.exe 89 PID 2444 wrote to memory of 3120 2444 Silkroad.exe 91 PID 2444 wrote to memory of 3120 2444 Silkroad.exe 91 PID 2444 wrote to memory of 3120 2444 Silkroad.exe 91 PID 2444 wrote to memory of 3992 2444 Silkroad.exe 184 PID 2444 wrote to memory of 3992 2444 Silkroad.exe 184 PID 2444 wrote to memory of 3992 2444 Silkroad.exe 184 PID 2020 wrote to memory of 3880 2020 Silkroad.exe 93 PID 2020 wrote to memory of 3880 2020 Silkroad.exe 93 PID 2020 wrote to memory of 3880 2020 Silkroad.exe 93 PID 2020 wrote to memory of 3936 2020 Silkroad.exe 95 PID 2020 wrote to memory of 3936 2020 Silkroad.exe 95 PID 2020 wrote to memory of 3936 2020 Silkroad.exe 95 PID 3992 wrote to memory of 4196 3992 Silkroad.exe 96 PID 3992 wrote to memory of 4196 3992 Silkroad.exe 96 PID 3992 wrote to memory of 4196 3992 Silkroad.exe 96 PID 3992 wrote to memory of 1600 3992 Silkroad.exe 97 PID 3992 wrote to memory of 1600 3992 Silkroad.exe 97 PID 3992 wrote to memory of 1600 3992 Silkroad.exe 97 PID 3936 wrote to memory of 2492 3936 Silkroad.exe 188 PID 3936 wrote to memory of 2492 3936 Silkroad.exe 188 PID 3936 wrote to memory of 2492 3936 Silkroad.exe 188 PID 3936 wrote to memory of 3688 3936 Silkroad.exe 100 PID 3936 wrote to memory of 3688 3936 Silkroad.exe 100 PID 3936 wrote to memory of 3688 3936 Silkroad.exe 100 PID 1600 wrote to memory of 1536 1600 Silkroad.exe 144 PID 1600 wrote to memory of 1536 1600 Silkroad.exe 144 PID 1600 wrote to memory of 1536 1600 Silkroad.exe 144 PID 1600 wrote to memory of 3400 1600 Silkroad.exe 102 PID 1600 wrote to memory of 3400 1600 Silkroad.exe 102 PID 1600 wrote to memory of 3400 1600 Silkroad.exe 102 PID 3688 wrote to memory of 4444 3688 Silkroad.exe 103 PID 3688 wrote to memory of 4444 3688 Silkroad.exe 103 PID 3688 wrote to memory of 4444 3688 Silkroad.exe 103 PID 3688 wrote to memory of 3512 3688 Silkroad.exe 104 PID 3688 wrote to memory of 3512 3688 Silkroad.exe 104 PID 3688 wrote to memory of 3512 3688 Silkroad.exe 104 PID 3400 wrote to memory of 2636 3400 Silkroad.exe 105 PID 3400 wrote to memory of 2636 3400 Silkroad.exe 105 PID 3400 wrote to memory of 2636 3400 Silkroad.exe 105 PID 3400 wrote to memory of 2860 3400 Silkroad.exe 155 PID 3400 wrote to memory of 2860 3400 Silkroad.exe 155 PID 3400 wrote to memory of 2860 3400 Silkroad.exe 155 PID 3512 wrote to memory of 1208 3512 Silkroad.exe 107 PID 3512 wrote to memory of 1208 3512 Silkroad.exe 107 PID 3512 wrote to memory of 1208 3512 Silkroad.exe 107 PID 3512 wrote to memory of 1964 3512 Silkroad.exe 200
Processes
-
C:\Users\Admin\AppData\Local\Temp\0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0184268ed51034fb5bb309a06c23cc92_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:3192 -
C:\Users\Admin\AppData\Local\Temp\silkroad.exe"C:\Users\Admin\AppData\Local\Temp\silkroad.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:4188 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4900 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4900 -s 8124⤵
- Program crash
PID:512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"4⤵
- Executes dropped EXE
PID:3120
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"5⤵
- Executes dropped EXE
PID:4196
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"6⤵
- Executes dropped EXE
PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3400 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"7⤵
- Executes dropped EXE
PID:2636
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2860 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1488
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"8⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:920 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 77210⤵
- Program crash
PID:1792
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"10⤵
- Executes dropped EXE
PID:2096
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4336 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"11⤵
- Executes dropped EXE
PID:232
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
PID:3416 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4292
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"13⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2656 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3548 -s 79615⤵
- Program crash
PID:1512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
PID:4260 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"15⤵
- Executes dropped EXE
PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1536 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"16⤵
- Executes dropped EXE
PID:3420
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"16⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:876 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4864
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2576 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1264 -s 77219⤵
- Program crash
PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"18⤵
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
PID:2848 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"19⤵PID:1144
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"19⤵PID:3188
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"20⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 78421⤵
- Program crash
PID:724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"20⤵
- System Location Discovery: System Language Discovery
PID:2692 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"21⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3588 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3588 -s 78422⤵
- Program crash
PID:4292
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"21⤵PID:2684
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"22⤵PID:3636
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"22⤵PID:692
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"23⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3452 -s 80424⤵
- Program crash
PID:4372
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"23⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3992 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"24⤵PID:3316
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"24⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"25⤵
- System Location Discovery: System Language Discovery
PID:1808
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"25⤵
- Drops file in Windows directory
PID:1244 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"26⤵PID:4416
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"26⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3144 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"27⤵PID:4320
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"27⤵PID:2980
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"28⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"28⤵
- Drops file in Windows directory
PID:4152 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"29⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1168 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1168 -s 78830⤵
- Program crash
PID:3964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"29⤵PID:4772
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"30⤵
- System Location Discovery: System Language Discovery
PID:4424
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"30⤵
- Checks computer location settings
PID:1456 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"31⤵PID:3368
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"31⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4124 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"32⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"32⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3480 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"33⤵PID:4596
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"33⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3584 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"34⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 824 -s 77635⤵
- Program crash
PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"34⤵PID:3904
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"35⤵PID:3596
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"35⤵
- Drops file in Windows directory
PID:3348 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"36⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2712 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 80037⤵
- Program crash
PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"36⤵
- Checks computer location settings
PID:2236 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"37⤵PID:3652
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"37⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3944 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"38⤵PID:1980
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"38⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4152 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"39⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4804 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4804 -s 79640⤵
- Program crash
PID:2692
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"39⤵PID:2308
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"40⤵PID:4272
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"40⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3416 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"41⤵PID:3372
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"41⤵
- Checks computer location settings
PID:5100 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"42⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"42⤵
- Drops file in Windows directory
PID:4356 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"43⤵
- System Location Discovery: System Language Discovery
PID:3648
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"43⤵
- Drops file in Windows directory
PID:4604 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"44⤵
- System Location Discovery: System Language Discovery
PID:3468
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"44⤵
- Drops file in Windows directory
PID:3404 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"45⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:3896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3896 -s 79246⤵
- Program crash
PID:552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"45⤵PID:3420
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"46⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"46⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"47⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 920 -s 77248⤵
- Program crash
PID:2200
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"47⤵PID:1152
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"48⤵PID:2948
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"48⤵
- Drops file in Windows directory
PID:1364 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"49⤵PID:1840
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"49⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3516 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"50⤵PID:1456
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"50⤵
- System Location Discovery: System Language Discovery
PID:5096 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"51⤵PID:244
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"51⤵
- Checks computer location settings
PID:4732 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"52⤵PID:1700
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"52⤵
- System Location Discovery: System Language Discovery
PID:5020 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"53⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 78454⤵
- Program crash
PID:3008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"53⤵
- Drops file in Windows directory
PID:3424 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"54⤵PID:1020
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"54⤵
- Checks computer location settings
PID:4428 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"55⤵PID:3076
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"55⤵
- Checks computer location settings
PID:1664 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"56⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"56⤵
- System Location Discovery: System Language Discovery
PID:4868 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"57⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 80058⤵
- Program crash
PID:384
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"57⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3472 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"58⤵
- System Location Discovery: System Language Discovery
PID:4128
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"58⤵
- Checks computer location settings
PID:2200 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"59⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:1136 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1136 -s 80860⤵
- Program crash
PID:3636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"59⤵PID:3516
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"60⤵PID:4592
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"60⤵PID:692
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"61⤵PID:4476
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"61⤵
- Drops file in Windows directory
PID:2976 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"62⤵PID:2072
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"62⤵
- Drops file in Windows directory
PID:4604 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"63⤵PID:3788
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"63⤵PID:844
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"64⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4232 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4232 -s 80865⤵
- Program crash
PID:4040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"64⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:5068 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"65⤵PID:4392
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"65⤵
- Checks computer location settings
PID:3600 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"66⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2828 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 78067⤵
- Program crash
PID:2852
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"66⤵
- Checks computer location settings
PID:460 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"67⤵PID:4468
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"67⤵
- Checks computer location settings
PID:1656 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"68⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:4124 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4124 -s 79669⤵
- Program crash
PID:2648
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"68⤵PID:4516
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"69⤵PID:1276
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"69⤵
- Checks computer location settings
PID:3588 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"70⤵
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 77271⤵
- Program crash
PID:3828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"70⤵
- Checks computer location settings
PID:3052 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"71⤵PID:1984
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"71⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2724 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"72⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 77273⤵
- Program crash
PID:1076
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"72⤵
- System Location Discovery: System Language Discovery
PID:3100 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"73⤵PID:2284
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"73⤵
- Checks computer location settings
PID:844 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"74⤵PID:2672
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"74⤵PID:3944
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"75⤵PID:60
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"75⤵PID:3604
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"76⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"76⤵
- Checks computer location settings
PID:3476 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"77⤵PID:2576
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"77⤵
- Checks computer location settings
PID:2104 -
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"78⤵
- Adds Run key to start application
PID:3976 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3976 -s 76079⤵
- Program crash
PID:4124
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"78⤵PID:940
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"79⤵PID:4732
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"79⤵PID:4476
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"80⤵PID:5060
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"80⤵PID:2836
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"81⤵PID:4848
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"81⤵PID:3032
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"82⤵PID:3396
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"82⤵PID:8
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"83⤵PID:2296
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 78484⤵
- Program crash
PID:3876
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"83⤵PID:4852
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"84⤵PID:3608
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"84⤵PID:4780
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"85⤵PID:2264
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 79686⤵
- Program crash
PID:4884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"85⤵PID:4488
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"86⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"86⤵PID:2828
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"87⤵PID:732
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"87⤵PID:4532
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"88⤵PID:2952
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"88⤵PID:2648
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"89⤵PID:4484
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4484 -s 77290⤵
- Program crash
PID:2836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"89⤵PID:2088
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"90⤵PID:3008
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"90⤵PID:2528
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"91⤵PID:4112
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"91⤵PID:4996
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"92⤵PID:2980
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 79293⤵
- Program crash
PID:4952
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"92⤵PID:8
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"93⤵PID:2916
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"93⤵PID:3696
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"94⤵PID:3856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3856 -s 80095⤵
- Program crash
PID:1608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"94⤵PID:920
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"95⤵PID:4504
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"95⤵PID:3476
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"96⤵PID:636
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"96⤵PID:208
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"97⤵PID:4476
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4476 -s 77298⤵
- Program crash
PID:3404
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"97⤵PID:3828
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"98⤵PID:4064
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4064 -s 79699⤵
- Program crash
PID:3212
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"98⤵PID:5004
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"99⤵PID:4748
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"99⤵PID:880
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"100⤵PID:632
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 632 -s 804101⤵
- Program crash
PID:3928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"100⤵PID:4952
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"101⤵PID:2388
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"101⤵PID:3248
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"102⤵PID:3668
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"102⤵PID:1188
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"103⤵PID:5116
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"103⤵PID:4960
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"104⤵PID:4800
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4800 -s 772105⤵
- Program crash
PID:2976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"104⤵PID:2648
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"105⤵PID:940
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"105⤵PID:4276
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"106⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"106⤵PID:2032
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"107⤵PID:3872
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3872 -s 784108⤵
- Program crash
PID:4244
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"107⤵PID:2780
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"108⤵PID:3048
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"108⤵PID:4896
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"109⤵PID:4208
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"109⤵PID:3312
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"110⤵PID:3248
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"110⤵PID:4596
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"111⤵PID:3740
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"111⤵PID:1700
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"112⤵PID:4824
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"112⤵PID:4476
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"113⤵PID:716
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 792114⤵
- Program crash
PID:5004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"113⤵PID:3844
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"114⤵PID:4912
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"114⤵PID:3600
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"115⤵PID:1944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1944 -s 796116⤵
- Program crash
PID:2332
-
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"115⤵PID:3604
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"116⤵PID:3516
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"116⤵PID:1152
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"117⤵PID:5036
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"117⤵PID:3020
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"118⤵PID:3328
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"118⤵PID:3568
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"119⤵PID:3056
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"119⤵PID:4776
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"120⤵PID:5104
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"120⤵PID:4988
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"121⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"C:\Users\Admin\AppData\Local\Temp\Silkroad.exe"121⤵PID:4980
-
C:\Windows\system32GDHL.exe"C:\Windows\system32GDHL.exe"122⤵PID:2916
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-