Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08/10/2024, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe
-
Size
904KB
-
MD5
2338d72da8da28d6f6affe29b35db32e
-
SHA1
8c940134faee993f5256d994ba1d82d2ad3b4ea9
-
SHA256
33f980f8c21a98228cc87b13b7c75fad88768c1c791cbc46b100b7c30e5ae426
-
SHA512
8d50ab6798ae3ffc8b8285431aa502c6892aaa1458efd9d99068c8723e8fa8dda67746350cf2dc1497198e95702943ccc01989c63f3ed69f777c3452edede486
-
SSDEEP
24576:IrBSfvIReLBs1BqSTTKHhZbnNbdkY8eQMVt3xahrx:QsfvIRvCZbnccQy0rx
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" k.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe,C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe -
Sets file to hidden 1 TTPs 48 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2664 attrib.exe 1032 attrib.exe 5960 attrib.exe 1140 attrib.exe 1136 attrib.exe 3588 attrib.exe 3220 attrib.exe 1952 attrib.exe 4904 attrib.exe 436 attrib.exe 1104 attrib.exe 1540 attrib.exe 1032 attrib.exe 1776 attrib.exe 2100 attrib.exe 1824 attrib.exe 5124 attrib.exe 4528 attrib.exe 2660 attrib.exe 4316 attrib.exe 4488 attrib.exe 3216 attrib.exe 1136 attrib.exe 1452 attrib.exe 2204 attrib.exe 2440 attrib.exe 444 attrib.exe 4036 attrib.exe 5952 attrib.exe 3392 attrib.exe 4252 attrib.exe 5016 attrib.exe 4624 attrib.exe 1924 attrib.exe 5672 attrib.exe 5684 attrib.exe 972 attrib.exe 1464 attrib.exe 3408 attrib.exe 3144 attrib.exe 1116 attrib.exe 1672 attrib.exe 1960 attrib.exe 3896 attrib.exe 3100 attrib.exe 4928 attrib.exe 908 attrib.exe 4392 attrib.exe -
Checks computer location settings 2 TTPs 25 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation k.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation svch0stc.exe -
Executes dropped EXE 25 IoCs
pid Process 3048 129660.devid.info.exe 4376 k.exe 2404 svch0stc.exe 3520 svch0stc.exe 5016 svch0stc.exe 2980 svch0stc.exe 4140 svch0stc.exe 408 svch0stc.exe 3148 svch0stc.exe 4812 svch0stc.exe 2888 svch0stc.exe 4232 svch0stc.exe 4564 svch0stc.exe 4012 svch0stc.exe 2972 svch0stc.exe 4004 svch0stc.exe 2736 svch0stc.exe 3720 svch0stc.exe 1124 svch0stc.exe 2724 svch0stc.exe 5096 svch0stc.exe 436 svch0stc.exe 5728 svch0stc.exe 6008 svch0stc.exe 432 svch0stc.exe -
Adds Run key to start application 2 TTPs 24 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" k.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svch0stc.exe = "C:\\Windows\\system32\\svc\\svch0stc.exe" svch0stc.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe k.exe File opened for modification C:\Windows\SysWOW64\k.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File created C:\Windows\SysWOW64\k.exe 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc attrib.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe attrib.exe File opened for modification C:\Windows\SysWOW64\svc\ svch0stc.exe File created C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\svch0stc.exe svch0stc.exe File opened for modification C:\Windows\SysWOW64\svc\ k.exe -
resource yara_rule behavioral2/files/0x0009000000023c8b-5.dat upx behavioral2/memory/3048-15-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3048-157-0x0000000000400000-0x0000000000422000-memory.dmp upx behavioral2/memory/3048-160-0x0000000000400000-0x0000000000422000-memory.dmp upx -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64 attrib.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PING.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svch0stc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 48 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 4460 PING.EXE 3664 PING.EXE 4880 cmd.exe 1356 PING.EXE 4480 cmd.exe 5584 cmd.exe 5704 PING.EXE 5984 PING.EXE 1856 PING.EXE 5880 cmd.exe 5076 cmd.exe 1092 PING.EXE 3124 cmd.exe 2984 cmd.exe 2588 PING.EXE 5132 cmd.exe 400 cmd.exe 3680 PING.EXE 3004 PING.EXE 1652 cmd.exe 4160 cmd.exe 1316 PING.EXE 3168 cmd.exe 1632 PING.EXE 1648 PING.EXE 1968 PING.EXE 660 cmd.exe 2024 PING.EXE 772 cmd.exe 4756 PING.EXE 2716 PING.EXE 3720 cmd.exe 4468 cmd.exe 2236 cmd.exe 3540 PING.EXE 1976 PING.EXE 2144 PING.EXE 3168 PING.EXE 6124 cmd.exe 4800 PING.EXE 2700 cmd.exe 732 cmd.exe 984 PING.EXE 4564 cmd.exe 5040 cmd.exe 2404 PING.EXE 2336 cmd.exe 1720 cmd.exe -
Modifies registry class 25 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ k.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ svch0stc.exe -
Runs ping.exe 1 TTPs 24 IoCs
pid Process 2588 PING.EXE 1968 PING.EXE 1092 PING.EXE 2404 PING.EXE 2024 PING.EXE 3168 PING.EXE 1856 PING.EXE 5984 PING.EXE 1316 PING.EXE 4800 PING.EXE 4460 PING.EXE 3664 PING.EXE 3540 PING.EXE 1976 PING.EXE 3680 PING.EXE 4756 PING.EXE 1648 PING.EXE 984 PING.EXE 1356 PING.EXE 2716 PING.EXE 2144 PING.EXE 5704 PING.EXE 1632 PING.EXE 3004 PING.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 4376 k.exe Token: SeSecurityPrivilege 4376 k.exe Token: SeTakeOwnershipPrivilege 4376 k.exe Token: SeLoadDriverPrivilege 4376 k.exe Token: SeSystemProfilePrivilege 4376 k.exe Token: SeSystemtimePrivilege 4376 k.exe Token: SeProfSingleProcessPrivilege 4376 k.exe Token: SeIncBasePriorityPrivilege 4376 k.exe Token: SeCreatePagefilePrivilege 4376 k.exe Token: SeBackupPrivilege 4376 k.exe Token: SeRestorePrivilege 4376 k.exe Token: SeShutdownPrivilege 4376 k.exe Token: SeDebugPrivilege 4376 k.exe Token: SeSystemEnvironmentPrivilege 4376 k.exe Token: SeChangeNotifyPrivilege 4376 k.exe Token: SeRemoteShutdownPrivilege 4376 k.exe Token: SeUndockPrivilege 4376 k.exe Token: SeManageVolumePrivilege 4376 k.exe Token: SeImpersonatePrivilege 4376 k.exe Token: SeCreateGlobalPrivilege 4376 k.exe Token: 33 4376 k.exe Token: 34 4376 k.exe Token: 35 4376 k.exe Token: 36 4376 k.exe Token: SeIncreaseQuotaPrivilege 2404 svch0stc.exe Token: SeSecurityPrivilege 2404 svch0stc.exe Token: SeTakeOwnershipPrivilege 2404 svch0stc.exe Token: SeLoadDriverPrivilege 2404 svch0stc.exe Token: SeSystemProfilePrivilege 2404 svch0stc.exe Token: SeSystemtimePrivilege 2404 svch0stc.exe Token: SeProfSingleProcessPrivilege 2404 svch0stc.exe Token: SeIncBasePriorityPrivilege 2404 svch0stc.exe Token: SeCreatePagefilePrivilege 2404 svch0stc.exe Token: SeBackupPrivilege 2404 svch0stc.exe Token: SeRestorePrivilege 2404 svch0stc.exe Token: SeShutdownPrivilege 2404 svch0stc.exe Token: SeDebugPrivilege 2404 svch0stc.exe Token: SeSystemEnvironmentPrivilege 2404 svch0stc.exe Token: SeChangeNotifyPrivilege 2404 svch0stc.exe Token: SeRemoteShutdownPrivilege 2404 svch0stc.exe Token: SeUndockPrivilege 2404 svch0stc.exe Token: SeManageVolumePrivilege 2404 svch0stc.exe Token: SeImpersonatePrivilege 2404 svch0stc.exe Token: SeCreateGlobalPrivilege 2404 svch0stc.exe Token: 33 2404 svch0stc.exe Token: 34 2404 svch0stc.exe Token: 35 2404 svch0stc.exe Token: 36 2404 svch0stc.exe Token: SeIncreaseQuotaPrivilege 3520 svch0stc.exe Token: SeSecurityPrivilege 3520 svch0stc.exe Token: SeTakeOwnershipPrivilege 3520 svch0stc.exe Token: SeLoadDriverPrivilege 3520 svch0stc.exe Token: SeSystemProfilePrivilege 3520 svch0stc.exe Token: SeSystemtimePrivilege 3520 svch0stc.exe Token: SeProfSingleProcessPrivilege 3520 svch0stc.exe Token: SeIncBasePriorityPrivilege 3520 svch0stc.exe Token: SeCreatePagefilePrivilege 3520 svch0stc.exe Token: SeBackupPrivilege 3520 svch0stc.exe Token: SeRestorePrivilege 3520 svch0stc.exe Token: SeShutdownPrivilege 3520 svch0stc.exe Token: SeDebugPrivilege 3520 svch0stc.exe Token: SeSystemEnvironmentPrivilege 3520 svch0stc.exe Token: SeChangeNotifyPrivilege 3520 svch0stc.exe Token: SeRemoteShutdownPrivilege 3520 svch0stc.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 3048 129660.devid.info.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1328 wrote to memory of 3048 1328 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe 86 PID 1328 wrote to memory of 3048 1328 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe 86 PID 1328 wrote to memory of 3048 1328 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe 86 PID 1328 wrote to memory of 4376 1328 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe 87 PID 1328 wrote to memory of 4376 1328 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe 87 PID 1328 wrote to memory of 4376 1328 2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe 87 PID 4376 wrote to memory of 1460 4376 k.exe 88 PID 4376 wrote to memory of 1460 4376 k.exe 88 PID 4376 wrote to memory of 1460 4376 k.exe 88 PID 4376 wrote to memory of 2148 4376 k.exe 90 PID 4376 wrote to memory of 2148 4376 k.exe 90 PID 4376 wrote to memory of 2148 4376 k.exe 90 PID 4376 wrote to memory of 4468 4376 k.exe 92 PID 4376 wrote to memory of 4468 4376 k.exe 92 PID 4376 wrote to memory of 4468 4376 k.exe 92 PID 2148 wrote to memory of 1140 2148 cmd.exe 94 PID 2148 wrote to memory of 1140 2148 cmd.exe 94 PID 2148 wrote to memory of 1140 2148 cmd.exe 94 PID 1460 wrote to memory of 3408 1460 cmd.exe 95 PID 1460 wrote to memory of 3408 1460 cmd.exe 95 PID 1460 wrote to memory of 3408 1460 cmd.exe 95 PID 4468 wrote to memory of 4800 4468 cmd.exe 96 PID 4468 wrote to memory of 4800 4468 cmd.exe 96 PID 4468 wrote to memory of 4800 4468 cmd.exe 96 PID 4376 wrote to memory of 2404 4376 k.exe 97 PID 4376 wrote to memory of 2404 4376 k.exe 97 PID 4376 wrote to memory of 2404 4376 k.exe 97 PID 2404 wrote to memory of 2464 2404 svch0stc.exe 98 PID 2404 wrote to memory of 2464 2404 svch0stc.exe 98 PID 2404 wrote to memory of 2464 2404 svch0stc.exe 98 PID 2404 wrote to memory of 1640 2404 svch0stc.exe 100 PID 2404 wrote to memory of 1640 2404 svch0stc.exe 100 PID 2404 wrote to memory of 1640 2404 svch0stc.exe 100 PID 2404 wrote to memory of 5040 2404 svch0stc.exe 102 PID 2404 wrote to memory of 5040 2404 svch0stc.exe 102 PID 2404 wrote to memory of 5040 2404 svch0stc.exe 102 PID 2464 wrote to memory of 3144 2464 cmd.exe 104 PID 2464 wrote to memory of 3144 2464 cmd.exe 104 PID 2464 wrote to memory of 3144 2464 cmd.exe 104 PID 1640 wrote to memory of 1116 1640 cmd.exe 105 PID 1640 wrote to memory of 1116 1640 cmd.exe 105 PID 1640 wrote to memory of 1116 1640 cmd.exe 105 PID 5040 wrote to memory of 4460 5040 cmd.exe 106 PID 5040 wrote to memory of 4460 5040 cmd.exe 106 PID 5040 wrote to memory of 4460 5040 cmd.exe 106 PID 2404 wrote to memory of 3520 2404 svch0stc.exe 107 PID 2404 wrote to memory of 3520 2404 svch0stc.exe 107 PID 2404 wrote to memory of 3520 2404 svch0stc.exe 107 PID 3520 wrote to memory of 4860 3520 svch0stc.exe 108 PID 3520 wrote to memory of 4860 3520 svch0stc.exe 108 PID 3520 wrote to memory of 4860 3520 svch0stc.exe 108 PID 3520 wrote to memory of 5068 3520 svch0stc.exe 110 PID 3520 wrote to memory of 5068 3520 svch0stc.exe 110 PID 3520 wrote to memory of 5068 3520 svch0stc.exe 110 PID 3520 wrote to memory of 4480 3520 svch0stc.exe 111 PID 3520 wrote to memory of 4480 3520 svch0stc.exe 111 PID 3520 wrote to memory of 4480 3520 svch0stc.exe 111 PID 4860 wrote to memory of 4252 4860 cmd.exe 114 PID 4860 wrote to memory of 4252 4860 cmd.exe 114 PID 4860 wrote to memory of 4252 4860 cmd.exe 114 PID 5068 wrote to memory of 4528 5068 cmd.exe 115 PID 5068 wrote to memory of 4528 5068 cmd.exe 115 PID 5068 wrote to memory of 4528 5068 cmd.exe 115 PID 4480 wrote to memory of 3664 4480 cmd.exe 116 -
Views/modifies file attributes 1 TTPs 48 IoCs
pid Process 5672 attrib.exe 4528 attrib.exe 1452 attrib.exe 1960 attrib.exe 444 attrib.exe 2100 attrib.exe 4036 attrib.exe 4928 attrib.exe 5124 attrib.exe 3144 attrib.exe 1776 attrib.exe 4316 attrib.exe 3588 attrib.exe 4488 attrib.exe 1952 attrib.exe 1824 attrib.exe 1140 attrib.exe 4624 attrib.exe 1924 attrib.exe 3392 attrib.exe 5952 attrib.exe 3408 attrib.exe 1116 attrib.exe 2440 attrib.exe 3100 attrib.exe 1032 attrib.exe 908 attrib.exe 5684 attrib.exe 1032 attrib.exe 3896 attrib.exe 1464 attrib.exe 436 attrib.exe 1136 attrib.exe 4252 attrib.exe 1104 attrib.exe 1540 attrib.exe 2660 attrib.exe 5016 attrib.exe 3220 attrib.exe 4904 attrib.exe 1136 attrib.exe 5960 attrib.exe 4392 attrib.exe 2204 attrib.exe 1672 attrib.exe 972 attrib.exe 2664 attrib.exe 3216 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2338d72da8da28d6f6affe29b35db32e_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\129660.devid.info.exe"C:\Users\Admin\AppData\Local\Temp\129660.devid.info.exe"2⤵
- Executes dropped EXE
- Suspicious use of FindShellTrayWindow
PID:3048
-
-
C:\Windows\SysWOW64\k.exe"C:\Windows\system32\k.exe"2⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4376 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\k.exe" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\k.exe" +s +h4⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3408
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64" +s +h3⤵
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64" +s +h4⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:1140
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\k.exe"3⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 44⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4800
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"3⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h4⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h5⤵
- Sets file to hidden
- Views/modifies file attributes
PID:3144
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h4⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h5⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1116
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"4⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:5040 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 45⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4460
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"4⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h5⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h6⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4252
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h5⤵
- Suspicious use of WriteProcessMemory
PID:5068 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h6⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:4528
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"5⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 46⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3664
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"5⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5016 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h6⤵
- System Location Discovery: System Language Discovery
PID:3832 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h7⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1104
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h6⤵
- System Location Discovery: System Language Discovery
PID:1592 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h7⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1452
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"6⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2700 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 47⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1648
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"6⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2980 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h7⤵PID:4976
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h8⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2204
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h7⤵
- System Location Discovery: System Language Discovery
PID:1360 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h8⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1540
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"7⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2236 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 48⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3540
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"7⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4140 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h8⤵PID:1892
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h9⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h8⤵PID:460
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h9⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"8⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5076 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 49⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1968
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"8⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h9⤵
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h10⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:2440
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h9⤵
- System Location Discovery: System Language Discovery
PID:4676 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h10⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"9⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:732 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 410⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1976
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"9⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3148 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h10⤵PID:3136
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h11⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2660
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h10⤵PID:3996
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h11⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:3896
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"10⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:660 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 411⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1092
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"10⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4812 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h11⤵
- System Location Discovery: System Language Discovery
PID:3396 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h12⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1776
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h11⤵PID:2896
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h12⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4316
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"11⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4880 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 412⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:984
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"11⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2888 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h12⤵PID:2116
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h13⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3588
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h12⤵PID:1148
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h13⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:972
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"12⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:400 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 413⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2404
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"12⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:4232 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h13⤵
- System Location Discovery: System Language Discovery
PID:3984 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h14⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:444
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h13⤵PID:1448
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h14⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5016
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"13⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:772 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 414⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3680
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"13⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4564 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h14⤵PID:1776
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h15⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4488
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h14⤵
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h15⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:2100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"14⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:2336 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 415⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:4756
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"14⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:4012 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h15⤵PID:2468
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h16⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4624
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h15⤵PID:3792
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h16⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1464
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"15⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1720 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 416⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2024
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"15⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h16⤵PID:408
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h17⤵
- Sets file to hidden
- Views/modifies file attributes
PID:2664
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h16⤵
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h17⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3100
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"16⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:4160 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 417⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3004
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"16⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4004 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h17⤵PID:3252
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h18⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:3220
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h17⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h18⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"17⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3124 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 418⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1356
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"17⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2736 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h18⤵PID:4620
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h19⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3216
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h18⤵
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h19⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4904
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"18⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2984 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 419⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:3168
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"18⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:3720 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h19⤵
- System Location Discovery: System Language Discovery
PID:1464 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h20⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4036
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h19⤵PID:4916
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h20⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"19⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:4564 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 420⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1316
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"19⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1124 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h20⤵PID:1544
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h21⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:1136
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h20⤵PID:4796
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h21⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"20⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:3168 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 421⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2716
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"20⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2724 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h21⤵
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h22⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:4928
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h21⤵PID:3584
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h22⤵
- Sets file to hidden
- Views/modifies file attributes
PID:908
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"21⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:3720 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 422⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1856
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"21⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5096 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h22⤵PID:3388
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h23⤵
- Sets file to hidden
- Drops file in System32 directory
- Views/modifies file attributes
PID:1924
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h22⤵PID:2952
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h23⤵
- Sets file to hidden
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:436
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"22⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:1652 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 423⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2144
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"22⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:436 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h23⤵PID:5536
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h24⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5672
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h23⤵PID:5560
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h24⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5684
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"23⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5584 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 424⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5704
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"23⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:5728 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h24⤵PID:5824
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h25⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5960
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h24⤵PID:5832
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h25⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5952
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"24⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:5880 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 425⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:5984
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"24⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:6008 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h25⤵PID:6080
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h26⤵
- Sets file to hidden
- Views/modifies file attributes
PID:5124
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h25⤵PID:6108
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h26⤵
- Sets file to hidden
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:3392
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"25⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:6124 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 426⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:2588
-
-
-
C:\Windows\SysWOW64\svc\svch0stc.exe"C:\Windows\system32\svc\svch0stc.exe"25⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:432 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h26⤵PID:5576
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc\svch0stc.exe" +s +h27⤵
- Sets file to hidden
- Views/modifies file attributes
PID:4392
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Windows\SysWOW64\svc" +s +h26⤵PID:5688
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Windows\SysWOW64\svc" +s +h27⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1824
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k ping 127.0.0.1 -n 4 && del "C:\Windows\SysWOW64\svc\svch0stc.exe"26⤵
- System Network Configuration Discovery: Internet Connection Discovery
PID:5132 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 427⤵
- System Network Configuration Discovery: Internet Connection Discovery
- Runs ping.exe
PID:1632
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Privilege Escalation
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
1Winlogon Helper DLL
1Defense Evasion
Hide Artifacts
2Hidden Files and Directories
2Modify Registry
2Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD50464f7cd5a269ce6d73e113ff88e40c2
SHA1e3536313e6444849ae348bdeac2b7c7ae0f35c73
SHA2560c5309e712ab405e1ea0e5b44ca653df714f5a6f1c009fd5e858d7f6966e1d5a
SHA51211fc5b0c14037fe1e337358abe3936ff1d54cbbdcebb443db91caec1ec347cbe8c1254fa17892904979acb633ab067316c412fc225ca26e79018dbeb221f5a06
-
Filesize
679KB
MD53d1987b493e403e4e8d56eaae7c00c78
SHA1f6ff0ce4bb2bb9d66f0d8c279e668c9156e64239
SHA2563ed21ae72ad73ba1e2d5cc63e492180080af53255b3537efe1c4feb1934a62cb
SHA512e8286ceeebe6b11655f9a9f076cb8b444378392b516ef3a3eb5a6ad8c13ce27257d90d45cb291825e05d080fd384b59af90be734d8b04c2a3aab3a259fb33a3c