Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2024, 20:26
Static task
static1
Behavioral task
behavioral1
Sample
074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe
-
Size
73KB
-
MD5
074c415b7ff6216759269472e63ef44d
-
SHA1
238dfa827dcaa7ac3f48d30909abd20ecfedbb8e
-
SHA256
e776bac009401a8690377b7b49ba6ff61aea4eea48e1d3f208284556292fefc3
-
SHA512
8b93a53a7620a069ac046484f6c3ace792a8e83b6425d90de4b582f03d2dae3d2e531754708d4d7b9e2b5189b070f734cba9f43f084d11fd6615d5c9cb4ff81b
-
SSDEEP
1536:81z9+RskvxHkV3dDivpPpfl/WZD8bWdjyv4NXuuSY5T3:y9+Rsk54tclll/RbWtyv49V3
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 64 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run wcsydrv.exe -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe Key value queried \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\Control Panel\International\Geo\Nation wcsydrv.exe -
Executes dropped EXE 64 IoCs
pid Process 5108 wcsydrv.exe 2436 wcsydrv.exe 3344 wcsydrv.exe 4932 wcsydrv.exe 4168 wcsydrv.exe 1976 wcsydrv.exe 3464 wcsydrv.exe 4892 wcsydrv.exe 2440 wcsydrv.exe 860 wcsydrv.exe 264 wcsydrv.exe 3208 wcsydrv.exe 1652 wcsydrv.exe 808 wcsydrv.exe 3696 wcsydrv.exe 3164 wcsydrv.exe 1940 wcsydrv.exe 1096 wcsydrv.exe 3560 wcsydrv.exe 4552 wcsydrv.exe 3368 wcsydrv.exe 1140 wcsydrv.exe 4668 wcsydrv.exe 512 wcsydrv.exe 1448 wcsydrv.exe 4568 wcsydrv.exe 2824 wcsydrv.exe 3700 wcsydrv.exe 412 wcsydrv.exe 2412 wcsydrv.exe 4208 wcsydrv.exe 1528 wcsydrv.exe 2456 wcsydrv.exe 2500 wcsydrv.exe 1596 wcsydrv.exe 4220 wcsydrv.exe 2560 wcsydrv.exe 3548 wcsydrv.exe 968 wcsydrv.exe 548 wcsydrv.exe 2324 wcsydrv.exe 4460 wcsydrv.exe 2776 wcsydrv.exe 2192 wcsydrv.exe 2128 wcsydrv.exe 4284 wcsydrv.exe 3076 wcsydrv.exe 1988 wcsydrv.exe 4264 wcsydrv.exe 1960 wcsydrv.exe 4176 wcsydrv.exe 2400 wcsydrv.exe 428 wcsydrv.exe 3344 wcsydrv.exe 2172 wcsydrv.exe 3200 wcsydrv.exe 1456 wcsydrv.exe 2788 wcsydrv.exe 3532 wcsydrv.exe 2440 wcsydrv.exe 1800 wcsydrv.exe 5064 wcsydrv.exe 1656 wcsydrv.exe 1652 wcsydrv.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe" 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe Set value (str) \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Services Data = "C:\\Users\\Admin\\AppData\\Local\\Temp\\wcsydrv.exe" wcsydrv.exe -
Modifies WinLogon 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Windows start = "explorer.exe" wcsydrv.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 3592 set thread context of 2400 3592 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 83 PID 5108 set thread context of 2436 5108 wcsydrv.exe 85 PID 3344 set thread context of 4932 3344 wcsydrv.exe 87 PID 4168 set thread context of 1976 4168 wcsydrv.exe 89 PID 3464 set thread context of 4892 3464 wcsydrv.exe 91 PID 2440 set thread context of 860 2440 wcsydrv.exe 93 PID 264 set thread context of 3208 264 wcsydrv.exe 95 PID 1652 set thread context of 808 1652 wcsydrv.exe 97 PID 3696 set thread context of 3164 3696 wcsydrv.exe 99 PID 1940 set thread context of 1096 1940 wcsydrv.exe 101 PID 3560 set thread context of 4552 3560 wcsydrv.exe 103 PID 3368 set thread context of 1140 3368 wcsydrv.exe 105 PID 4668 set thread context of 512 4668 wcsydrv.exe 107 PID 1448 set thread context of 4568 1448 wcsydrv.exe 109 PID 2824 set thread context of 3700 2824 wcsydrv.exe 111 PID 412 set thread context of 2412 412 wcsydrv.exe 113 PID 4208 set thread context of 1528 4208 wcsydrv.exe 115 PID 2456 set thread context of 2500 2456 wcsydrv.exe 117 PID 1596 set thread context of 4220 1596 wcsydrv.exe 119 PID 2560 set thread context of 3548 2560 wcsydrv.exe 121 PID 968 set thread context of 548 968 wcsydrv.exe 123 PID 2324 set thread context of 4460 2324 wcsydrv.exe 125 PID 2776 set thread context of 2192 2776 wcsydrv.exe 127 PID 2128 set thread context of 4284 2128 wcsydrv.exe 129 PID 3076 set thread context of 1988 3076 wcsydrv.exe 131 PID 4264 set thread context of 1960 4264 wcsydrv.exe 133 PID 4176 set thread context of 2400 4176 wcsydrv.exe 135 PID 428 set thread context of 3344 428 wcsydrv.exe 137 PID 2172 set thread context of 3200 2172 wcsydrv.exe 139 PID 1456 set thread context of 2788 1456 wcsydrv.exe 141 PID 3532 set thread context of 2440 3532 wcsydrv.exe 143 PID 1800 set thread context of 5064 1800 wcsydrv.exe 145 PID 1656 set thread context of 1652 1656 wcsydrv.exe 147 PID 3864 set thread context of 3696 3864 wcsydrv.exe 149 PID 4936 set thread context of 1940 4936 wcsydrv.exe 152 PID 4756 set thread context of 3956 4756 wcsydrv.exe 155 PID 4380 set thread context of 4100 4380 wcsydrv.exe 157 PID 1792 set thread context of 392 1792 wcsydrv.exe 160 PID 2912 set thread context of 1400 2912 wcsydrv.exe 163 PID 1320 set thread context of 2404 1320 wcsydrv.exe 165 PID 3144 set thread context of 1548 3144 wcsydrv.exe 167 PID 4868 set thread context of 3708 4868 wcsydrv.exe 169 PID 2584 set thread context of 1496 2584 wcsydrv.exe 171 PID 884 set thread context of 968 884 wcsydrv.exe 173 PID 2736 set thread context of 3248 2736 wcsydrv.exe 175 PID 456 set thread context of 4972 456 wcsydrv.exe 177 PID 4804 set thread context of 4812 4804 wcsydrv.exe 180 PID 4980 set thread context of 3724 4980 wcsydrv.exe 182 PID 1988 set thread context of 4556 1988 wcsydrv.exe 184 PID 1960 set thread context of 2488 1960 wcsydrv.exe 186 PID 1392 set thread context of 2400 1392 wcsydrv.exe 188 PID 1152 set thread context of 1956 1152 wcsydrv.exe 190 PID 4740 set thread context of 2256 4740 wcsydrv.exe 193 PID 3296 set thread context of 860 3296 wcsydrv.exe 196 PID 4960 set thread context of 1656 4960 wcsydrv.exe 198 PID 404 set thread context of 808 404 wcsydrv.exe 200 PID 1816 set thread context of 4436 1816 wcsydrv.exe 202 PID 3060 set thread context of 3972 3060 wcsydrv.exe 204 PID 3956 set thread context of 4744 3956 wcsydrv.exe 206 PID 4100 set thread context of 2996 4100 wcsydrv.exe 208 PID 1256 set thread context of 2564 1256 wcsydrv.exe 210 PID 744 set thread context of 2404 744 wcsydrv.exe 212 PID 4732 set thread context of 5116 4732 wcsydrv.exe 214 PID 1408 set thread context of 5036 1408 wcsydrv.exe 216 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcsydrv.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2400 3592 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 83 PID 3592 wrote to memory of 2400 3592 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 83 PID 3592 wrote to memory of 2400 3592 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 83 PID 3592 wrote to memory of 2400 3592 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 83 PID 3592 wrote to memory of 2400 3592 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 83 PID 2400 wrote to memory of 5108 2400 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 84 PID 2400 wrote to memory of 5108 2400 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 84 PID 2400 wrote to memory of 5108 2400 074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe 84 PID 5108 wrote to memory of 2436 5108 wcsydrv.exe 85 PID 5108 wrote to memory of 2436 5108 wcsydrv.exe 85 PID 5108 wrote to memory of 2436 5108 wcsydrv.exe 85 PID 5108 wrote to memory of 2436 5108 wcsydrv.exe 85 PID 5108 wrote to memory of 2436 5108 wcsydrv.exe 85 PID 2436 wrote to memory of 3344 2436 wcsydrv.exe 86 PID 2436 wrote to memory of 3344 2436 wcsydrv.exe 86 PID 2436 wrote to memory of 3344 2436 wcsydrv.exe 86 PID 3344 wrote to memory of 4932 3344 wcsydrv.exe 87 PID 3344 wrote to memory of 4932 3344 wcsydrv.exe 87 PID 3344 wrote to memory of 4932 3344 wcsydrv.exe 87 PID 3344 wrote to memory of 4932 3344 wcsydrv.exe 87 PID 3344 wrote to memory of 4932 3344 wcsydrv.exe 87 PID 4932 wrote to memory of 4168 4932 wcsydrv.exe 88 PID 4932 wrote to memory of 4168 4932 wcsydrv.exe 88 PID 4932 wrote to memory of 4168 4932 wcsydrv.exe 88 PID 4168 wrote to memory of 1976 4168 wcsydrv.exe 89 PID 4168 wrote to memory of 1976 4168 wcsydrv.exe 89 PID 4168 wrote to memory of 1976 4168 wcsydrv.exe 89 PID 4168 wrote to memory of 1976 4168 wcsydrv.exe 89 PID 4168 wrote to memory of 1976 4168 wcsydrv.exe 89 PID 1976 wrote to memory of 3464 1976 wcsydrv.exe 90 PID 1976 wrote to memory of 3464 1976 wcsydrv.exe 90 PID 1976 wrote to memory of 3464 1976 wcsydrv.exe 90 PID 3464 wrote to memory of 4892 3464 wcsydrv.exe 91 PID 3464 wrote to memory of 4892 3464 wcsydrv.exe 91 PID 3464 wrote to memory of 4892 3464 wcsydrv.exe 91 PID 3464 wrote to memory of 4892 3464 wcsydrv.exe 91 PID 3464 wrote to memory of 4892 3464 wcsydrv.exe 91 PID 4892 wrote to memory of 2440 4892 wcsydrv.exe 92 PID 4892 wrote to memory of 2440 4892 wcsydrv.exe 92 PID 4892 wrote to memory of 2440 4892 wcsydrv.exe 92 PID 2440 wrote to memory of 860 2440 wcsydrv.exe 93 PID 2440 wrote to memory of 860 2440 wcsydrv.exe 93 PID 2440 wrote to memory of 860 2440 wcsydrv.exe 93 PID 2440 wrote to memory of 860 2440 wcsydrv.exe 93 PID 2440 wrote to memory of 860 2440 wcsydrv.exe 93 PID 860 wrote to memory of 264 860 wcsydrv.exe 94 PID 860 wrote to memory of 264 860 wcsydrv.exe 94 PID 860 wrote to memory of 264 860 wcsydrv.exe 94 PID 264 wrote to memory of 3208 264 wcsydrv.exe 95 PID 264 wrote to memory of 3208 264 wcsydrv.exe 95 PID 264 wrote to memory of 3208 264 wcsydrv.exe 95 PID 264 wrote to memory of 3208 264 wcsydrv.exe 95 PID 264 wrote to memory of 3208 264 wcsydrv.exe 95 PID 3208 wrote to memory of 1652 3208 wcsydrv.exe 96 PID 3208 wrote to memory of 1652 3208 wcsydrv.exe 96 PID 3208 wrote to memory of 1652 3208 wcsydrv.exe 96 PID 1652 wrote to memory of 808 1652 wcsydrv.exe 97 PID 1652 wrote to memory of 808 1652 wcsydrv.exe 97 PID 1652 wrote to memory of 808 1652 wcsydrv.exe 97 PID 1652 wrote to memory of 808 1652 wcsydrv.exe 97 PID 1652 wrote to memory of 808 1652 wcsydrv.exe 97 PID 808 wrote to memory of 3696 808 wcsydrv.exe 98 PID 808 wrote to memory of 3696 808 wcsydrv.exe 98 PID 808 wrote to memory of 3696 808 wcsydrv.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\074c415b7ff6216759269472e63ef44d_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\074c415b7ff6216759269472e63ef44d_JaffaCakes118.exe2⤵
- Adds Run key to start application
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4932 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe8⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe12⤵
- Executes dropped EXE
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3208 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe16⤵
- Executes dropped EXE
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:808 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe18⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:3164 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe20⤵
- Executes dropped EXE
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe22⤵
- Checks computer location settings
- Executes dropped EXE
PID:4552 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe24⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe26⤵
- Executes dropped EXE
PID:512 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe28⤵
- Executes dropped EXE
- Modifies WinLogon
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe30⤵
- Checks computer location settings
- Executes dropped EXE
PID:3700 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:412 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe32⤵
- Checks computer location settings
- Executes dropped EXE
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4208 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe34⤵
- Executes dropped EXE
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe36⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe38⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:4220 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe40⤵
- Executes dropped EXE
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:968 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies WinLogon
PID:548 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies WinLogon
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe46⤵
- Executes dropped EXE
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe48⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:4284 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe50⤵
- Checks computer location settings
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe52⤵
- Executes dropped EXE
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4176 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe54⤵
- Adds policy Run key to start application
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:428 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe56⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:3344 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe58⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Modifies WinLogon
PID:3200 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe60⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe62⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe64⤵
- Adds policy Run key to start application
- Executes dropped EXE
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe66⤵
- Executes dropped EXE
- Modifies WinLogon
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a67⤵
- Suspicious use of SetThreadContext
PID:3864 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe68⤵
- Adds policy Run key to start application
- Modifies WinLogon
PID:3696 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a69⤵
- Suspicious use of SetThreadContext
PID:4936 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe70⤵
- Checks computer location settings
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a71⤵
- Suspicious use of SetThreadContext
PID:4756 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe72⤵
- Adds Run key to start application
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a73⤵
- Suspicious use of SetThreadContext
PID:4380 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe74⤵
- Adds policy Run key to start application
- Checks computer location settings
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a75⤵
- Suspicious use of SetThreadContext
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe76⤵
- Adds policy Run key to start application
PID:392 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a77⤵
- Suspicious use of SetThreadContext
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe78⤵
- Checks computer location settings
- Modifies WinLogon
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a79⤵
- Suspicious use of SetThreadContext
PID:1320 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe80⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a81⤵
- Suspicious use of SetThreadContext
PID:3144 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe82⤵
- Modifies WinLogon
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a83⤵
- Suspicious use of SetThreadContext
PID:4868 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe84⤵
- Checks computer location settings
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a85⤵
- Suspicious use of SetThreadContext
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe86⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a87⤵
- Suspicious use of SetThreadContext
PID:884 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe88⤵
- Checks computer location settings
PID:968 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a89⤵
- Suspicious use of SetThreadContext
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe90⤵
- Modifies WinLogon
PID:3248 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a91⤵
- Suspicious use of SetThreadContext
PID:456 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe92⤵PID:4972
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a93⤵
- Suspicious use of SetThreadContext
PID:4804 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe94⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4812 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a95⤵
- Suspicious use of SetThreadContext
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe96⤵
- Adds Run key to start application
PID:3724 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a97⤵
- Suspicious use of SetThreadContext
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe98⤵
- Adds Run key to start application
PID:4556 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a99⤵
- Suspicious use of SetThreadContext
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe100⤵
- Adds Run key to start application
- Modifies WinLogon
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a101⤵
- Suspicious use of SetThreadContext
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe102⤵
- Adds policy Run key to start application
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a103⤵
- Suspicious use of SetThreadContext
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe104⤵
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a105⤵
- Suspicious use of SetThreadContext
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe106⤵
- Checks computer location settings
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a107⤵
- Suspicious use of SetThreadContext
PID:3296 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe108⤵
- Adds Run key to start application
PID:860 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a109⤵
- Suspicious use of SetThreadContext
PID:4960 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe110⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a111⤵
- Suspicious use of SetThreadContext
PID:404 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe112⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a113⤵
- Suspicious use of SetThreadContext
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe114⤵PID:4436
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a115⤵
- Suspicious use of SetThreadContext
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe116⤵PID:3972
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a117⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3956 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe118⤵
- Adds Run key to start application
- Modifies WinLogon
PID:4744 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a119⤵
- Suspicious use of SetThreadContext
PID:4100 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe120⤵PID:2996
-
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe"C:\Users\Admin\AppData\Local\Temp\wcsydrv.exe" a121⤵
- Suspicious use of SetThreadContext
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\wcsydrv.exeC:\Users\Admin\AppData\Local\Temp\wcsydrv.exe122⤵
- Adds policy Run key to start application
- Checks computer location settings
PID:2564
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-