Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
01/10/2024, 00:20
Static task
static1
Behavioral task
behavioral1
Sample
03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe
-
Size
82KB
-
MD5
03bd7cae039e262c631fb39ebc1211ff
-
SHA1
06d4dff49e1bdbf84d4b73d76d82229b743c2cd6
-
SHA256
1dbbbc1945c70764b2fd23abe297dd0491887310aaeacb8df57c52217795a346
-
SHA512
4013b7227fbb55b7c4bf4c719fdd20c41f7440fb885e6bca5faefb98678e17b3c02365202d250d30d903617cf82f6a5b37f090b23f27d4bf0fa7ec564a4b4673
-
SSDEEP
1536:sbOJvHdltZsCzWt7IEllRLgToq6MBivJR:sbEv/tZo+EllRLgToq6MBiv3
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, C:\\windows\\system32\\drivers\\svchost.exe" 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
Drops file in Drivers directory 4 IoCs
description ioc Process File created C:\WINDOWS\system32\drivers\stub.exe 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe File created C:\windows\system32\drivers\svchost.exe 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe File created C:\windows\system32\drivers\tmpp.exe 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe File created C:\WINDOWS\system32\drivers\Interop.MessengerAPI.dll 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
Executes dropped EXE 64 IoCs
pid Process 2688 temp.exe 2720 temp.exe 2340 temp.exe 2516 temp.exe 932 temp.exe 2452 temp.exe 1016 temp.exe 2436 temp.exe 2620 temp.exe 1280 temp.exe 3060 temp.exe 2504 temp.exe 1668 temp.exe 2128 temp.exe 948 temp.exe 1708 temp.exe 3064 temp.exe 3024 temp.exe 2340 temp.exe 2556 temp.exe 960 temp.exe 2932 temp.exe 2644 temp.exe 1032 temp.exe 2288 temp.exe 1792 temp.exe 1740 temp.exe 2124 temp.exe 2380 temp.exe 1044 temp.exe 1088 temp.exe 1544 temp.exe 976 temp.exe 2360 temp.exe 1720 temp.exe 2016 temp.exe 904 temp.exe 2212 temp.exe 2312 temp.exe 992 temp.exe 2448 temp.exe 828 temp.exe 1948 temp.exe 2588 temp.exe 1508 temp.exe 2320 temp.exe 2308 temp.exe 464 temp.exe 2252 temp.exe 2288 temp.exe 2340 temp.exe 1740 temp.exe 2264 temp.exe 864 temp.exe 1780 temp.exe 844 temp.exe 1016 temp.exe 1336 temp.exe 1276 temp.exe 1756 temp.exe 564 temp.exe 1952 temp.exe 2656 temp.exe 916 temp.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created F:\recycler\S-1-5-21-8749679017-0950430147-468708784-3200\desktop.ini 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe File opened for modification F:\recycler\S-1-5-21-8749679017-0950430147-468708784-3200\desktop.ini 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UIHost = "logonui.exe, C:\\WINDOWS\\system32\\dllcache\\recycled.exe" 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe File opened for modification F:\autorun.inf 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\dllcache\tmp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe File created C:\WINDOWS\system32\temp.exe temp.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2688 2648 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2688 2648 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe 30 PID 2648 wrote to memory of 2688 2648 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe 30 PID 2688 wrote to memory of 2720 2688 temp.exe 31 PID 2688 wrote to memory of 2720 2688 temp.exe 31 PID 2688 wrote to memory of 2720 2688 temp.exe 31 PID 2720 wrote to memory of 2340 2720 temp.exe 32 PID 2720 wrote to memory of 2340 2720 temp.exe 32 PID 2720 wrote to memory of 2340 2720 temp.exe 32 PID 2340 wrote to memory of 2516 2340 temp.exe 33 PID 2340 wrote to memory of 2516 2340 temp.exe 33 PID 2340 wrote to memory of 2516 2340 temp.exe 33 PID 2516 wrote to memory of 932 2516 temp.exe 34 PID 2516 wrote to memory of 932 2516 temp.exe 34 PID 2516 wrote to memory of 932 2516 temp.exe 34 PID 932 wrote to memory of 2452 932 temp.exe 35 PID 932 wrote to memory of 2452 932 temp.exe 35 PID 932 wrote to memory of 2452 932 temp.exe 35 PID 2452 wrote to memory of 1016 2452 temp.exe 36 PID 2452 wrote to memory of 1016 2452 temp.exe 36 PID 2452 wrote to memory of 1016 2452 temp.exe 36 PID 1016 wrote to memory of 2436 1016 temp.exe 37 PID 1016 wrote to memory of 2436 1016 temp.exe 37 PID 1016 wrote to memory of 2436 1016 temp.exe 37 PID 2436 wrote to memory of 2620 2436 temp.exe 38 PID 2436 wrote to memory of 2620 2436 temp.exe 38 PID 2436 wrote to memory of 2620 2436 temp.exe 38 PID 2620 wrote to memory of 1280 2620 temp.exe 39 PID 2620 wrote to memory of 1280 2620 temp.exe 39 PID 2620 wrote to memory of 1280 2620 temp.exe 39 PID 1280 wrote to memory of 3060 1280 temp.exe 40 PID 1280 wrote to memory of 3060 1280 temp.exe 40 PID 1280 wrote to memory of 3060 1280 temp.exe 40 PID 3060 wrote to memory of 2504 3060 temp.exe 41 PID 3060 wrote to memory of 2504 3060 temp.exe 41 PID 3060 wrote to memory of 2504 3060 temp.exe 41 PID 2504 wrote to memory of 1668 2504 temp.exe 42 PID 2504 wrote to memory of 1668 2504 temp.exe 42 PID 2504 wrote to memory of 1668 2504 temp.exe 42 PID 1668 wrote to memory of 2128 1668 temp.exe 43 PID 1668 wrote to memory of 2128 1668 temp.exe 43 PID 1668 wrote to memory of 2128 1668 temp.exe 43 PID 2128 wrote to memory of 948 2128 temp.exe 44 PID 2128 wrote to memory of 948 2128 temp.exe 44 PID 2128 wrote to memory of 948 2128 temp.exe 44 PID 948 wrote to memory of 1708 948 temp.exe 45 PID 948 wrote to memory of 1708 948 temp.exe 45 PID 948 wrote to memory of 1708 948 temp.exe 45 PID 1708 wrote to memory of 3064 1708 temp.exe 46 PID 1708 wrote to memory of 3064 1708 temp.exe 46 PID 1708 wrote to memory of 3064 1708 temp.exe 46 PID 3064 wrote to memory of 3024 3064 temp.exe 47 PID 3064 wrote to memory of 3024 3064 temp.exe 47 PID 3064 wrote to memory of 3024 3064 temp.exe 47 PID 3024 wrote to memory of 2340 3024 temp.exe 48 PID 3024 wrote to memory of 2340 3024 temp.exe 48 PID 3024 wrote to memory of 2340 3024 temp.exe 48 PID 2340 wrote to memory of 2556 2340 temp.exe 49 PID 2340 wrote to memory of 2556 2340 temp.exe 49 PID 2340 wrote to memory of 2556 2340 temp.exe 49 PID 2556 wrote to memory of 960 2556 temp.exe 50 PID 2556 wrote to memory of 960 2556 temp.exe 50 PID 2556 wrote to memory of 960 2556 temp.exe 50 PID 960 wrote to memory of 2932 960 temp.exe 51 -
System policy modification 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" 03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\03bd7cae039e262c631fb39ebc1211ff_JaffaCakes118.exe"1⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops file in Drivers directory
- Checks whether UAC is enabled
- Drops desktop.ini file(s)
- Modifies WinLogon
- Drops autorun.inf file
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2648 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:932 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"11⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"14⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:948 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:960 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2932 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"24⤵
- Executes dropped EXE
PID:2644 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"25⤵
- Executes dropped EXE
PID:1032 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"26⤵
- Executes dropped EXE
PID:2288 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"27⤵
- Executes dropped EXE
PID:1792 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"28⤵
- Executes dropped EXE
PID:1740 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"29⤵
- Executes dropped EXE
PID:2124 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"30⤵
- Executes dropped EXE
PID:2380 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"31⤵
- Executes dropped EXE
PID:1044 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"32⤵
- Executes dropped EXE
PID:1088 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"33⤵
- Executes dropped EXE
PID:1544 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"34⤵
- Executes dropped EXE
PID:976 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"35⤵
- Executes dropped EXE
PID:2360 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"36⤵
- Executes dropped EXE
PID:1720 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"37⤵
- Executes dropped EXE
PID:2016 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"38⤵
- Executes dropped EXE
PID:904 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"39⤵
- Executes dropped EXE
PID:2212 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"40⤵
- Executes dropped EXE
PID:2312 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"41⤵
- Executes dropped EXE
PID:992 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"42⤵
- Executes dropped EXE
PID:2448 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"43⤵
- Executes dropped EXE
PID:828 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"44⤵
- Executes dropped EXE
PID:1948 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"45⤵
- Executes dropped EXE
PID:2588 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"46⤵
- Executes dropped EXE
PID:1508 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"47⤵
- Executes dropped EXE
PID:2320 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"48⤵
- Executes dropped EXE
PID:2308 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"49⤵
- Executes dropped EXE
PID:464 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"50⤵
- Executes dropped EXE
PID:2252 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"51⤵
- Executes dropped EXE
PID:2288 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"52⤵
- Executes dropped EXE
PID:2340 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"53⤵
- Executes dropped EXE
PID:1740 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"54⤵
- Executes dropped EXE
PID:2264 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"55⤵
- Executes dropped EXE
PID:864 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"56⤵
- Executes dropped EXE
PID:1780 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"57⤵
- Executes dropped EXE
PID:844 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"58⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1016 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"59⤵
- Executes dropped EXE
PID:1336 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"60⤵
- Executes dropped EXE
PID:1276 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"61⤵
- Executes dropped EXE
PID:1756 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"62⤵
- Executes dropped EXE
PID:564 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"63⤵
- Executes dropped EXE
PID:1952 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"64⤵
- Executes dropped EXE
PID:2656 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"65⤵
- Executes dropped EXE
PID:916 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"66⤵PID:2764
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"67⤵PID:2556
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"68⤵PID:2372
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"69⤵PID:1844
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"70⤵PID:2572
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"71⤵PID:1896
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"72⤵PID:1960
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"73⤵PID:2044
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"74⤵PID:2912
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"75⤵PID:264
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"76⤵PID:2560
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"77⤵
- Drops file in System32 directory
PID:2180 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"78⤵PID:2748
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"79⤵PID:1740
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"80⤵PID:1980
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"81⤵PID:1984
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"82⤵PID:2732
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"83⤵PID:1676
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"84⤵PID:540
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"85⤵PID:352
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"86⤵PID:2452
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"87⤵PID:2132
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"88⤵PID:3000
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"89⤵PID:2552
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"90⤵PID:2708
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"91⤵PID:2160
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"92⤵PID:992
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"93⤵PID:2728
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"94⤵PID:2632
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"95⤵PID:2196
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"96⤵PID:2572
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"97⤵PID:2540
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"98⤵PID:2104
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"99⤵PID:2044
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"100⤵PID:2912
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"101⤵PID:2144
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"102⤵PID:2560
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"103⤵PID:2096
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"104⤵PID:748
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"105⤵
- Drops file in System32 directory
PID:1740 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"106⤵PID:1780
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"107⤵PID:1984
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"108⤵PID:1760
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"109⤵PID:976
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"110⤵
- Drops file in System32 directory
PID:1336 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"111⤵PID:2368
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"112⤵PID:2452
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"113⤵
- Drops file in System32 directory
PID:888 -
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"114⤵PID:3000
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"115⤵PID:2980
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"116⤵PID:2008
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"117⤵PID:2992
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"118⤵PID:992
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"119⤵PID:1624
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"120⤵PID:2632
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"121⤵PID:1732
-
C:\WINDOWS\system32\dllcache\temp.exe"C:\WINDOWS\system32\dllcache\temp.exe"122⤵PID:2076
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-