Analysis
-
max time kernel
18s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 19:46
Static task
static1
Behavioral task
behavioral1
Sample
0c39c098de7d708584645b6c637526da_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
0c39c098de7d708584645b6c637526da_JaffaCakes118.exe
Resource
win10v2004-20240802-en
General
-
Target
0c39c098de7d708584645b6c637526da_JaffaCakes118.exe
-
Size
265KB
-
MD5
0c39c098de7d708584645b6c637526da
-
SHA1
7c1fd9c8673ec45aaf1f5d9211198cb77826d4b9
-
SHA256
a2335e318c0c30d281b343b2706f35ec97427bd072061c724479f0c756ca3f5b
-
SHA512
989233163c25fd9f64c2cd05394dbce4ff1bca61d87d8de455be6b8876596918693cdb6b41a2c91bdf43ae0183cae2fc86a8ef034312c865fd40537258e8643a
-
SSDEEP
6144:OY94NKF1jcewpPIU5X16c+ivPSzmYurPXJqQZRJ4f1G15Hp:l9OsNonVOmTrhqQZRJNJ
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 816 rinst.exe 2244 index.exe 2912 bpk.exe 2828 index.exe 2900 index.exe 2504 index.exe 2612 index.exe 2632 index.exe 2688 index.exe 2352 index.exe 2264 index.exe 848 index.exe 3000 index.exe 2716 index.exe 2844 index.exe 2508 index.exe 1008 index.exe 1640 index.exe 1560 index.exe 1760 index.exe 2144 index.exe 1948 index.exe 1816 index.exe 320 index.exe 380 index.exe 1340 index.exe 1900 index.exe 908 index.exe 2360 index.exe 3040 index.exe 2372 index.exe 408 index.exe 1132 index.exe 1548 index.exe 1080 index.exe 1292 index.exe 2584 index.exe 1912 index.exe 2416 index.exe 1432 index.exe 1884 index.exe 1800 index.exe 1556 index.exe 1692 index.exe 1060 index.exe 2464 index.exe 1088 index.exe 884 index.exe 928 index.exe 2044 index.exe 3008 index.exe 2256 index.exe 1864 index.exe 2036 index.exe 2692 index.exe 2696 index.exe 2076 index.exe 2096 index.exe 640 index.exe 2164 index.exe 1920 index.exe 500 index.exe 1956 index.exe 1192 index.exe -
Loads dropped DLL 64 IoCs
pid Process 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 816 rinst.exe 816 rinst.exe 2244 index.exe 2244 index.exe 816 rinst.exe 816 rinst.exe 2828 index.exe 2828 index.exe 2900 index.exe 2900 index.exe 2504 index.exe 2504 index.exe 2612 index.exe 2612 index.exe 2632 index.exe 2632 index.exe 2688 index.exe 2688 index.exe 2352 index.exe 2352 index.exe 2264 index.exe 2264 index.exe 848 index.exe 848 index.exe 3000 index.exe 3000 index.exe 2912 bpk.exe 2716 index.exe 2716 index.exe 2912 bpk.exe 2844 index.exe 2844 index.exe 2508 index.exe 2508 index.exe 1008 index.exe 1008 index.exe 1640 index.exe 1640 index.exe 1560 index.exe 1560 index.exe 1760 index.exe 1760 index.exe 2144 index.exe 2144 index.exe 1948 index.exe 1948 index.exe 1816 index.exe 1816 index.exe 320 index.exe 320 index.exe 380 index.exe 380 index.exe 1340 index.exe 1340 index.exe 1900 index.exe 1900 index.exe 908 index.exe 908 index.exe 2360 index.exe 2360 index.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\index = "C:\\Windows\\system32\\index.exe" Process not Found -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" bpk.exe -
Modifies WinLogon 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Startup = "WLEStartup" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Startup = "WLEStartup" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logoff = "WLELogoff" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Logon = "WLELogon" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Unlock = "WLEUnlock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" Process not Found Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\StopScreenSaver = "WLEStopScreenSaver" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\DllName = "index.dll" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" Process not Found Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Shutdown = "WLEShutdown" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Lock = "WLELock" index.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Startup = "WLEStartup" index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Asynchronous = "0" index.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\index\Impersonate = "0" index.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe Process not Found File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe File created C:\Windows\SysWOW64\index.exe index.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language index.exe -
Modifies registry class 46 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32\ = "C:\\Windows\\SysWOW64\\bpkwb.dll" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CurVer\ = "PK.IE.1" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID\ = "PK.IE.1" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR\ = "C:\\Windows\\SysWOW64\\" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ = "C:\\Windows\\SysWOW64\\bpkwb.dll" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "IE Plugin Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\HELPDIR bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\VersionIndependentProgID\ = "PK.IE" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32\ThreadingModel = "Apartment" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\ = "BPK IE Plugin Type Library" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\FLAGS\ = "0" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\CLSID\ = "{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ProgID bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\InprocServer32 bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Wow6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2912 bpk.exe 2912 bpk.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe 2912 bpk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2432 wrote to memory of 816 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 30 PID 2432 wrote to memory of 816 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 30 PID 2432 wrote to memory of 816 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 30 PID 2432 wrote to memory of 816 2432 0c39c098de7d708584645b6c637526da_JaffaCakes118.exe 30 PID 816 wrote to memory of 2244 816 rinst.exe 31 PID 816 wrote to memory of 2244 816 rinst.exe 31 PID 816 wrote to memory of 2244 816 rinst.exe 31 PID 816 wrote to memory of 2244 816 rinst.exe 31 PID 2244 wrote to memory of 2828 2244 index.exe 32 PID 2244 wrote to memory of 2828 2244 index.exe 32 PID 2244 wrote to memory of 2828 2244 index.exe 32 PID 2244 wrote to memory of 2828 2244 index.exe 32 PID 816 wrote to memory of 2912 816 rinst.exe 33 PID 816 wrote to memory of 2912 816 rinst.exe 33 PID 816 wrote to memory of 2912 816 rinst.exe 33 PID 816 wrote to memory of 2912 816 rinst.exe 33 PID 2828 wrote to memory of 2900 2828 index.exe 34 PID 2828 wrote to memory of 2900 2828 index.exe 34 PID 2828 wrote to memory of 2900 2828 index.exe 34 PID 2828 wrote to memory of 2900 2828 index.exe 34 PID 2900 wrote to memory of 2504 2900 index.exe 35 PID 2900 wrote to memory of 2504 2900 index.exe 35 PID 2900 wrote to memory of 2504 2900 index.exe 35 PID 2900 wrote to memory of 2504 2900 index.exe 35 PID 2504 wrote to memory of 2612 2504 index.exe 36 PID 2504 wrote to memory of 2612 2504 index.exe 36 PID 2504 wrote to memory of 2612 2504 index.exe 36 PID 2504 wrote to memory of 2612 2504 index.exe 36 PID 2612 wrote to memory of 2632 2612 index.exe 37 PID 2612 wrote to memory of 2632 2612 index.exe 37 PID 2612 wrote to memory of 2632 2612 index.exe 37 PID 2612 wrote to memory of 2632 2612 index.exe 37 PID 2632 wrote to memory of 2688 2632 index.exe 38 PID 2632 wrote to memory of 2688 2632 index.exe 38 PID 2632 wrote to memory of 2688 2632 index.exe 38 PID 2632 wrote to memory of 2688 2632 index.exe 38 PID 2688 wrote to memory of 2352 2688 index.exe 39 PID 2688 wrote to memory of 2352 2688 index.exe 39 PID 2688 wrote to memory of 2352 2688 index.exe 39 PID 2688 wrote to memory of 2352 2688 index.exe 39 PID 2352 wrote to memory of 2264 2352 index.exe 40 PID 2352 wrote to memory of 2264 2352 index.exe 40 PID 2352 wrote to memory of 2264 2352 index.exe 40 PID 2352 wrote to memory of 2264 2352 index.exe 40 PID 2264 wrote to memory of 848 2264 index.exe 41 PID 2264 wrote to memory of 848 2264 index.exe 41 PID 2264 wrote to memory of 848 2264 index.exe 41 PID 2264 wrote to memory of 848 2264 index.exe 41 PID 848 wrote to memory of 3000 848 index.exe 42 PID 848 wrote to memory of 3000 848 index.exe 42 PID 848 wrote to memory of 3000 848 index.exe 42 PID 848 wrote to memory of 3000 848 index.exe 42 PID 3000 wrote to memory of 2716 3000 index.exe 43 PID 3000 wrote to memory of 2716 3000 index.exe 43 PID 3000 wrote to memory of 2716 3000 index.exe 43 PID 3000 wrote to memory of 2716 3000 index.exe 43 PID 2716 wrote to memory of 2844 2716 index.exe 44 PID 2716 wrote to memory of 2844 2716 index.exe 44 PID 2716 wrote to memory of 2844 2716 index.exe 44 PID 2716 wrote to memory of 2844 2716 index.exe 44 PID 2844 wrote to memory of 2508 2844 index.exe 45 PID 2844 wrote to memory of 2508 2844 index.exe 45 PID 2844 wrote to memory of 2508 2844 index.exe 45 PID 2844 wrote to memory of 2508 2844 index.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\0c39c098de7d708584645b6c637526da_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\0c39c098de7d708584645b6c637526da_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\index.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\index.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:848 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
PID:1008 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
PID:1640 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1560 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1760 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2144 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1948 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1816 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
PID:320 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
PID:380 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1340 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
PID:1900 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:908 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe30⤵
- Executes dropped EXE
PID:3040 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe31⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2372 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe32⤵
- Executes dropped EXE
PID:408 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe33⤵
- Executes dropped EXE
PID:1132 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe34⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1548 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe35⤵
- Executes dropped EXE
PID:1080 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe36⤵
- Executes dropped EXE
PID:1292 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe37⤵
- Executes dropped EXE
PID:2584 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe38⤵
- Executes dropped EXE
PID:1912 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe39⤵
- Executes dropped EXE
PID:2416 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe40⤵
- Executes dropped EXE
PID:1432 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe41⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe42⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe43⤵
- Executes dropped EXE
PID:1556 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe44⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe45⤵
- Executes dropped EXE
PID:1060 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe46⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2464 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe47⤵
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe48⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe50⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe51⤵
- Executes dropped EXE
- Modifies WinLogon
PID:3008 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe52⤵
- Executes dropped EXE
PID:2256 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe53⤵
- Executes dropped EXE
PID:1864 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe54⤵
- Executes dropped EXE
PID:2036 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe55⤵
- Executes dropped EXE
PID:2692 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe56⤵
- Executes dropped EXE
PID:2696 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe57⤵
- Executes dropped EXE
PID:2076 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe58⤵
- Executes dropped EXE
- Modifies WinLogon
PID:2096 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe59⤵
- Executes dropped EXE
PID:640 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe60⤵
- Executes dropped EXE
PID:2164 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe61⤵
- Executes dropped EXE
PID:1920 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe62⤵
- Executes dropped EXE
PID:500 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe63⤵
- Executes dropped EXE
PID:1956 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe64⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe65⤵PID:1508
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe66⤵PID:620
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe67⤵PID:768
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe68⤵PID:1656
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe69⤵PID:1940
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe70⤵PID:1700
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe71⤵PID:1600
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe72⤵PID:1608
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe73⤵PID:1696
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe74⤵
- Adds Run key to start application
PID:2156 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe75⤵PID:2356
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe76⤵PID:2376
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe77⤵PID:2404
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe78⤵PID:1720
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe79⤵
- System Location Discovery: System Language Discovery
PID:1856 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe80⤵PID:2380
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe81⤵PID:1664
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe82⤵PID:2448
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe83⤵PID:2764
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe84⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2916 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe85⤵PID:3020
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe86⤵PID:3028
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe87⤵PID:2908
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe88⤵PID:2620
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe89⤵
- Drops file in System32 directory
PID:2892 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe90⤵PID:2884
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe91⤵PID:2648
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe92⤵PID:2176
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe93⤵PID:2732
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe94⤵
- Modifies WinLogon
PID:3016 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe95⤵PID:2728
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe96⤵PID:2948
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe97⤵PID:2676
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe98⤵PID:2664
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe99⤵PID:2452
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe100⤵PID:816
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe101⤵PID:2784
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe102⤵PID:2628
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe103⤵
- Modifies WinLogon
- Drops file in System32 directory
PID:2172 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe104⤵PID:2864
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe105⤵
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe106⤵PID:2984
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe107⤵PID:2124
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe108⤵PID:2600
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe109⤵
- Adds Run key to start application
PID:796 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe110⤵PID:1244
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe111⤵PID:2368
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe112⤵
- Drops file in System32 directory
PID:1496 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe113⤵PID:3080
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe114⤵PID:3092
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe115⤵
- Modifies WinLogon
PID:3104 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe116⤵PID:3116
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe117⤵
- System Location Discovery: System Language Discovery
PID:3128 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe118⤵
- Modifies WinLogon
PID:3140 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe119⤵PID:3152
-
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe120⤵
- Drops file in System32 directory
PID:3164 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe121⤵
- Modifies WinLogon
PID:3176 -
C:\Windows\SysWOW64\index.exeC:\Windows\system32\index.exe122⤵PID:3188
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-