Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
32s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08/10/2024, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe
-
Size
1.5MB
-
MD5
2530def488a99d27c611bc134e1e3934
-
SHA1
edd162e96a572b46fbcf8ba22ee21fefcf5bbc13
-
SHA256
01a96940c20878157aa85abb198f7aa2c211d828bc15e32d5257298bb0635b4b
-
SHA512
75e67dfdc12e0019b684051ebfa9525135ca6fa9bce8d487ee62dcadb77d073b1da44e09dae301b40a1f839955b75f0ceb016d9e3f8629bb62e91e868c18d0cf
-
SSDEEP
24576:nhTjcRKZWKxN31yueVCfDdij38ZW2bE95hR4KHGe7cFnohytzMkJcD+PDe:nBcRMvFaPsZW+E9PHH7kohyzJtre
Malware Config
Signatures
-
Executes dropped EXE 27 IoCs
pid Process 2772 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2396 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 1940 XP-0EE37CC5.EXE 832 XP-0EE37CC5.EXE 1812 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2392 XP-0EE37CC5.EXE 1020 XP-0EE37CC5.EXE 1776 XP-0EE37CC5.EXE 1016 XP-0EE37CC5.EXE 2592 XP-0EE37CC5.EXE 1076 XP-0EE37CC5.EXE 2392 XP-0EE37CC5.EXE 832 XP-0EE37CC5.EXE 1016 XP-0EE37CC5.EXE 1224 XP-0EE37CC5.EXE 2124 XP-0EE37CC5.EXE -
Loads dropped DLL 64 IoCs
pid Process 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 27 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE File opened for modification \??\PhysicalDrive0 XP-0EE37CC5.EXE -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\XP-0EE37CC5.EXE 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\XP-0EE37CC5.EXE 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico explorer.exe -
System Location Discovery: System Language Discovery 1 TTPs 54 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language XP-0EE37CC5.EXE -
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe Set value (int) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar\Locked = "1" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Internet Explorer\Toolbar explorer.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\AllFolders\Shell\NavBar = 000000000000000000000000000000008b000000870000003153505305d5cdd59c2e1b10939708002b2cf9ae6b0000005a000000007b00360044003800420042003300440033002d0039004400380037002d0034004100390031002d0041004200350036002d003400460033003000430046004600450046004500390046007d005f0057006900640074006800000013000000f00000000000000000000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots = 02 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_Classes\Local Settings explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0 explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 200000001a00eebbfe2300001000d09ad3fd8f23af46adb46c85480369c700000000 explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Set value (data) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff explorer.exe Key created \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 explorer.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" explorer.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2772 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2856 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 2492 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 1484 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 2984 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1304 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 1992 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2000 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2664 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE 2368 XP-0EE37CC5.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2396 wrote to memory of 2360 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2360 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2360 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2360 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 30 PID 2396 wrote to memory of 2772 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 32 PID 2396 wrote to memory of 2772 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 32 PID 2396 wrote to memory of 2772 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 32 PID 2396 wrote to memory of 2772 2396 2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe 32 PID 2772 wrote to memory of 2852 2772 XP-0EE37CC5.EXE 33 PID 2772 wrote to memory of 2852 2772 XP-0EE37CC5.EXE 33 PID 2772 wrote to memory of 2852 2772 XP-0EE37CC5.EXE 33 PID 2772 wrote to memory of 2852 2772 XP-0EE37CC5.EXE 33 PID 2772 wrote to memory of 2856 2772 XP-0EE37CC5.EXE 34 PID 2772 wrote to memory of 2856 2772 XP-0EE37CC5.EXE 34 PID 2772 wrote to memory of 2856 2772 XP-0EE37CC5.EXE 34 PID 2772 wrote to memory of 2856 2772 XP-0EE37CC5.EXE 34 PID 2856 wrote to memory of 1680 2856 XP-0EE37CC5.EXE 36 PID 2856 wrote to memory of 1680 2856 XP-0EE37CC5.EXE 36 PID 2856 wrote to memory of 1680 2856 XP-0EE37CC5.EXE 36 PID 2856 wrote to memory of 1680 2856 XP-0EE37CC5.EXE 36 PID 2856 wrote to memory of 2492 2856 XP-0EE37CC5.EXE 37 PID 2856 wrote to memory of 2492 2856 XP-0EE37CC5.EXE 37 PID 2856 wrote to memory of 2492 2856 XP-0EE37CC5.EXE 37 PID 2856 wrote to memory of 2492 2856 XP-0EE37CC5.EXE 37 PID 2492 wrote to memory of 1676 2492 XP-0EE37CC5.EXE 38 PID 2492 wrote to memory of 1676 2492 XP-0EE37CC5.EXE 38 PID 2492 wrote to memory of 1676 2492 XP-0EE37CC5.EXE 38 PID 2492 wrote to memory of 1676 2492 XP-0EE37CC5.EXE 38 PID 2492 wrote to memory of 1484 2492 XP-0EE37CC5.EXE 40 PID 2492 wrote to memory of 1484 2492 XP-0EE37CC5.EXE 40 PID 2492 wrote to memory of 1484 2492 XP-0EE37CC5.EXE 40 PID 2492 wrote to memory of 1484 2492 XP-0EE37CC5.EXE 40 PID 1484 wrote to memory of 940 1484 XP-0EE37CC5.EXE 42 PID 1484 wrote to memory of 940 1484 XP-0EE37CC5.EXE 42 PID 1484 wrote to memory of 940 1484 XP-0EE37CC5.EXE 42 PID 1484 wrote to memory of 940 1484 XP-0EE37CC5.EXE 42 PID 1484 wrote to memory of 2984 1484 XP-0EE37CC5.EXE 77 PID 1484 wrote to memory of 2984 1484 XP-0EE37CC5.EXE 77 PID 1484 wrote to memory of 2984 1484 XP-0EE37CC5.EXE 77 PID 1484 wrote to memory of 2984 1484 XP-0EE37CC5.EXE 77 PID 2984 wrote to memory of 2924 2984 XP-0EE37CC5.EXE 45 PID 2984 wrote to memory of 2924 2984 XP-0EE37CC5.EXE 45 PID 2984 wrote to memory of 2924 2984 XP-0EE37CC5.EXE 45 PID 2984 wrote to memory of 2924 2984 XP-0EE37CC5.EXE 45 PID 2984 wrote to memory of 1304 2984 XP-0EE37CC5.EXE 46 PID 2984 wrote to memory of 1304 2984 XP-0EE37CC5.EXE 46 PID 2984 wrote to memory of 1304 2984 XP-0EE37CC5.EXE 46 PID 2984 wrote to memory of 1304 2984 XP-0EE37CC5.EXE 46 PID 1304 wrote to memory of 1744 1304 XP-0EE37CC5.EXE 48 PID 1304 wrote to memory of 1744 1304 XP-0EE37CC5.EXE 48 PID 1304 wrote to memory of 1744 1304 XP-0EE37CC5.EXE 48 PID 1304 wrote to memory of 1744 1304 XP-0EE37CC5.EXE 48 PID 1304 wrote to memory of 1992 1304 XP-0EE37CC5.EXE 50 PID 1304 wrote to memory of 1992 1304 XP-0EE37CC5.EXE 50 PID 1304 wrote to memory of 1992 1304 XP-0EE37CC5.EXE 50 PID 1304 wrote to memory of 1992 1304 XP-0EE37CC5.EXE 50 PID 1992 wrote to memory of 588 1992 XP-0EE37CC5.EXE 52 PID 1992 wrote to memory of 588 1992 XP-0EE37CC5.EXE 52 PID 1992 wrote to memory of 588 1992 XP-0EE37CC5.EXE 52 PID 1992 wrote to memory of 588 1992 XP-0EE37CC5.EXE 52 PID 1992 wrote to memory of 2000 1992 XP-0EE37CC5.EXE 53 PID 1992 wrote to memory of 2000 1992 XP-0EE37CC5.EXE 53 PID 1992 wrote to memory of 2000 1992 XP-0EE37CC5.EXE 53 PID 1992 wrote to memory of 2000 1992 XP-0EE37CC5.EXE 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\2530def488a99d27c611bc134e1e3934_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Users\Admin\AppData\Local\Temp\2530def488a99d27c611bc134e1e3934_JaffaCakes1182⤵
- System Location Discovery: System Language Discovery
PID:2360
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC53⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC54⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE4⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC55⤵
- System Location Discovery: System Language Discovery
PID:1676
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE5⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1484 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC56⤵
- System Location Discovery: System Language Discovery
PID:940
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC57⤵
- System Location Discovery: System Language Discovery
PID:2924
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE7⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC58⤵
- System Location Discovery: System Language Discovery
PID:1744
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1992 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC59⤵
- System Location Discovery: System Language Discovery
PID:588
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE9⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC510⤵
- System Location Discovery: System Language Discovery
PID:1828
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC511⤵
- System Location Discovery: System Language Discovery
PID:2444
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE11⤵
- Executes dropped EXE
- Loads dropped DLL
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC512⤵
- System Location Discovery: System Language Discovery
PID:1916
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE12⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC513⤵
- System Location Discovery: System Language Discovery
PID:2644
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE13⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC514⤵
- System Location Discovery: System Language Discovery
PID:2888
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE14⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1940 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC515⤵
- System Location Discovery: System Language Discovery
PID:1956
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE15⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:832 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC516⤵
- System Location Discovery: System Language Discovery
PID:2680
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE16⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1812 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC517⤵
- System Location Discovery: System Language Discovery
PID:1208
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE17⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2984 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC518⤵
- System Location Discovery: System Language Discovery
PID:980
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE18⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC519⤵
- System Location Discovery: System Language Discovery
PID:2124
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE19⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1020 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC520⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE20⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1776 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC521⤵
- System Location Discovery: System Language Discovery
PID:2980
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE21⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC522⤵
- System Location Discovery: System Language Discovery
PID:2964
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE22⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2592 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC523⤵
- System Location Discovery: System Language Discovery
PID:1964
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE23⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1076 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC524⤵
- System Location Discovery: System Language Discovery
PID:2368
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE24⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC525⤵
- System Location Discovery: System Language Discovery
PID:780
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE25⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:832 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC526⤵
- System Location Discovery: System Language Discovery
PID:2620
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE26⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1016 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC527⤵
- System Location Discovery: System Language Discovery
PID:1508
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE27⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC528⤵
- System Location Discovery: System Language Discovery
PID:2592
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE28⤵
- Executes dropped EXE
PID:2124 -
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC529⤵PID:2964
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE29⤵PID:2620
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC530⤵PID:3100
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE30⤵PID:3140
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC531⤵PID:3240
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE31⤵PID:3288
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC532⤵PID:3396
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE32⤵PID:3452
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC533⤵PID:3540
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE33⤵PID:3584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC534⤵PID:3692
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE34⤵PID:3732
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC535⤵PID:3848
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE35⤵PID:3896
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC536⤵PID:3992
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE36⤵PID:4036
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC537⤵PID:2964
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE37⤵PID:1680
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC538⤵PID:2620
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE38⤵PID:3460
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC539⤵PID:3592
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE39⤵PID:3556
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC540⤵PID:3712
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE40⤵PID:3588
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC541⤵PID:4080
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE41⤵PID:3164
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC542⤵PID:3516
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE42⤵PID:3508
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC543⤵PID:3928
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE43⤵PID:3716
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC544⤵PID:3612
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE44⤵PID:3720
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC545⤵PID:1368
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE45⤵PID:3976
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC546⤵PID:2832
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE46⤵PID:1276
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC547⤵PID:1368
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE47⤵PID:3240
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC548⤵PID:4156
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE48⤵PID:4220
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC549⤵PID:4340
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE49⤵PID:4376
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC550⤵PID:4464
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE50⤵PID:4524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC551⤵PID:4620
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE51⤵PID:4656
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC552⤵PID:4732
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE52⤵PID:4776
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC553⤵PID:4880
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE53⤵PID:4916
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC554⤵PID:5004
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE54⤵PID:5048
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC555⤵PID:3984
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE55⤵PID:3700
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC556⤵PID:4304
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE56⤵PID:1524
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC557⤵PID:4220
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE57⤵PID:4488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC558⤵PID:4528
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE58⤵PID:4876
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC559⤵PID:5036
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE59⤵PID:4148
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC560⤵PID:4172
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE60⤵PID:4128
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC561⤵PID:4776
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE61⤵PID:4488
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC562⤵PID:1524
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE62⤵PID:4644
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC563⤵PID:3700
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE63⤵PID:4584
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC564⤵PID:5208
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE64⤵PID:5248
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC565⤵PID:5340
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE65⤵PID:5380
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC566⤵PID:5452
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE66⤵PID:5496
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC567⤵PID:5568
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE67⤵PID:5612
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC568⤵PID:5704
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE68⤵PID:5748
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC569⤵PID:5844
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE69⤵PID:5884
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC570⤵PID:5968
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE70⤵PID:6008
-
C:\Windows\SysWOW64\explorer.exeexplorer C:\Windows\SysWOW64\XP-0EE37CC571⤵PID:6100
-
-
C:\Windows\SysWOW64\XP-0EE37CC5.EXEC:\Windows\system32\XP-0EE37CC5.EXE71⤵PID:5124
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2384
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2608
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:2112
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:1068
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:676
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:964
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1912
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1548
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2088
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1888
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2296
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1900
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2128
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Drops file in Windows directory
- Modifies Internet Explorer settings
- Modifies registry class
PID:1192
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2404
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2012
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2628
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:2324
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:856
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:1988
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
- Modifies registry class
PID:3060
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵
- Modifies Internet Explorer settings
PID:2576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1600
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2612
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2436
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2696
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:112
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:1964
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3132
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3280
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3444
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3576
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3740
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3888
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4028
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3088
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3408
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3668
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3908
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3108
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3344
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3856
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2124
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3728
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:3712
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:2832
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4212
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4368
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4512
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4648
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4768
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4908
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5040
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4156
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4508
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4732
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5008
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4608
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5076
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4928
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4340
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5240
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5372
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5488
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5604
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5740
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:5876
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6000
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:6140
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD5fcfe0b30217481810787745a756f75ae
SHA1d9b7dd9a97451801e547b4d134812d81cc826947
SHA256bb2681081f265befb35295a12c87ef5d6bebe61f0e84307dc5a707f534c200e9
SHA512f9eb4e7c142b620a21a62dc09aba9b961c73ecddb281028dbf67ce85dd9a8244a51052f10f79d454a0ff457e8cbf1cab145529bc892b45cb144ef8657ac02e73
-
Filesize
316KB
MD5884d1480eb7c8eb0c10a9ef2c7ab2cf3
SHA115d7d4c23fcb2d05160a41334c08d6af52708cfc
SHA2565b7ec7f0e92d60e87082ec934af2270e24286da9211f35dbb0ac32870c21a2dd
SHA512bb87b3ab1920ef2cb03563ab077d16c0abc4cd2437018bab092cd21224da7d35cd8d5f1e1e7f41d3bc05e43c4517c02cbf41a49d5a4d9c0a91133e2f684df9d9
-
Filesize
180KB
MD5c42abf56ffadaac8facd49deab5d7efd
SHA1cf7f0a84b8cf5bd9a5435b9e43344cb39b2ee2e6
SHA25636b1e6792d5e02ba1d00bf23147a1628d56d35ca8228089acb34f8b4bc90b6ab
SHA512b153a5ee00c2767b4f7ce7e9ff080f6f5e89937d3ee1ab3749d3774b7efbf3c20ae737b3f7bb714a3b0a5b62a7215697aa75aad25d14155257ea1e349bd656e6
-
Filesize
72KB
MD5ece50769d756f9276afa9c33a20c0fbf
SHA1bd5e1818c8653653fd356b045e588fe81b74154c
SHA25644b0c257f367f163811503ce371973d664600ff05bbdae520af8c5969c06ea69
SHA512511744aa248a83204579e494abe338e6c312c5b86a0081853dd6191af52f5f216985f928fd223e22399f119424857ec74d606ddd8c37e8ea78c2efc8abf9b553
-
Filesize
264KB
MD51a01df75a83fcb696008fda1f2d57f2e
SHA19d8ab468c3cb825efba45c5d54ade0f8227f9aef
SHA256df4cabce3ce6b1a3acaff18bdf2c1ab6f3eb796fafd16353198c30ffc8dca770
SHA51238e4dffcd733578f9071b2c96859b24a6ce3f7d85c70e25307d1be61ce0024191ea3dbf68afc552545d1bb23ff75f9ada9a372d7ec8a37701ce3c137c58535c0
-
Filesize
112KB
MD56faaaf12915fcaed1b8afca34fb5d765
SHA14ac8ba09fb3dd57ec2341b9aaeeb68257b1b3399
SHA256393a8a89d6fad74d5b3b76580492459b4120910450204a79fdd72086263510f7
SHA512fb046c00709163ae29a1b942d88776b69c161fcbc350c1bf9e13b18548fc04cea6c202fefa18420c71ce9d935621531ce38f8f9e379f5c366e1c496ef79250e0
-
Filesize
1.0MB
MD5cd3f9189bb853a8b61aa298943ac3d33
SHA19f8e35261f671c7769be911aa5b8be0e058acc77
SHA256d6b59046670765457e1ad777b03f63fd44f41f9fd13fb88ba9ac5a1226f0fdf1
SHA5124536125baf9f8c7f3fe3e4288faffec9c76864c10f7f7792a92c3a3d10b02c3d8ca9439270d9443206fed46eed835d3666497768322524835af566731f1f1b1d
-
Filesize
40KB
MD5d0a0ee4778abc9ee1dc3ae99e92ad046
SHA1434617f608018f52baf268715c411db88012ba5a
SHA2563ed77b4f719b08b13145e8bef5fe0b87180c10f78a6f7d7d983e833b6263fca9
SHA5123c5e243a68633303cb25b8a451c52ab37151a5111277d0b4a7d7904114fe479181c9681fe501a89b50c5046ae7ec6429dc91cb456e9fa8da2ba9a4a24e2a8771
-
Filesize
1.5MB
MD52530def488a99d27c611bc134e1e3934
SHA1edd162e96a572b46fbcf8ba22ee21fefcf5bbc13
SHA25601a96940c20878157aa85abb198f7aa2c211d828bc15e32d5257298bb0635b4b
SHA51275e67dfdc12e0019b684051ebfa9525135ca6fa9bce8d487ee62dcadb77d073b1da44e09dae301b40a1f839955b75f0ceb016d9e3f8629bb62e91e868c18d0cf