Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
10/10/2024, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe
-
Size
364KB
-
MD5
32108bd2710ad6e446e2a9ae7c56bff6
-
SHA1
7eec7141af3bfc04af9017d2259f4115916a56ee
-
SHA256
938a4f66e8d694b129da1443341cdb731d9d6d8410d4d8ca90700b76f9e0e719
-
SHA512
3a7cb00bd8718eb524f321bb5e5cf403f9a546de1c56bed105a88f6dbc273914e7463942db05164d2a3d4c8001c2821cbd8c35fae65c4b5c0d7ccf62545be316
-
SSDEEP
6144:PuqgQ/Y2iY1fHAmRd3VVdqM182P906ZY94NGTuq:xxx1fgm7VVUMDVI9O
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation 32108B~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3112 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 3368 svchost.com 1280 32108B~1.EXE 2620 svchost.com 4460 32108B~1.EXE 436 svchost.com 1344 32108B~1.EXE 2280 svchost.com 232 32108B~1.EXE 3444 svchost.com 4780 32108B~1.EXE 2540 svchost.com 1308 32108B~1.EXE 1584 svchost.com 1716 32108B~1.EXE 2708 svchost.com 2216 32108B~1.EXE 3604 svchost.com 3136 32108B~1.EXE 736 svchost.com 4900 32108B~1.EXE 4280 svchost.com 3720 32108B~1.EXE 1336 svchost.com 2620 32108B~1.EXE 436 svchost.com 4084 32108B~1.EXE 3712 svchost.com 4808 32108B~1.EXE 232 svchost.com 3744 32108B~1.EXE 4652 svchost.com 1016 32108B~1.EXE 5112 svchost.com 4916 32108B~1.EXE 2872 svchost.com 5048 32108B~1.EXE 3532 svchost.com 2752 32108B~1.EXE 3440 svchost.com 2264 32108B~1.EXE 3156 svchost.com 3204 32108B~1.EXE 2676 svchost.com 4516 32108B~1.EXE 4648 svchost.com 5080 32108B~1.EXE 4564 svchost.com 3312 32108B~1.EXE 3368 svchost.com 1280 32108B~1.EXE 3720 svchost.com 2528 32108B~1.EXE 1704 svchost.com 4804 32108B~1.EXE 1036 svchost.com 2928 32108B~1.EXE 3712 svchost.com 2948 32108B~1.EXE 232 svchost.com 672 32108B~1.EXE 1560 svchost.com 2980 32108B~1.EXE 3076 svchost.com -
Loads dropped DLL 5 IoCs
pid Process 8 bpk.exe 8 bpk.exe 8 bpk.exe 2760 A~NSISu_.exe 3980 32108B~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\bpk = "C:\\Windows\\SysWOW64\\bpk.exe" bpk.exe -
Installs/modifies Browser Helper Object 2 TTPs 2 IoCs
BHOs are DLL modules which act as plugins for Internet Explorer.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\ = "PK IE Plugin" bpk.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\dt\2024-10-10_22-27-46-240647781 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-50-240712187 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-08-240730281 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-47-240648781 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-55-240656812 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-25-240687109 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-46-240708203 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-01-240662875 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-10-240671937 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-26-240688125 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-27-240689109 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-33-240695109 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-16-240678000 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-17-240679015 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-27-49-240650812 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-44-240706203 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-00-240722218 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-31-240752328 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-43-240644765 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-53-240654812 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-42-240704203 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-29-12-240733312 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-12-240673984 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-29-05-240727250 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-29-09-240731296 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-24-240745328 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-29-06-240728265 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-18-240680031 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-27-240689109 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-54-240716187 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-01-240723234 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-29-240750328 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-14-240676015 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-36-240698156 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-53-240715203 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-29-27-240748312 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-52-240653843 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-43-240705203 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-26-240747328 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-57-240658843 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-29-240691125 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-28-240690140 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-46-240647781 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-55-240717203 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-29-03-240725234 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-30-240751312 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-15-240677015 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-25-240687109 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-37-240699156 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-43-240705203 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-27-47-240648781 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-15-240736328 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-28-02-240663906 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-03-240664921 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-27-52-240653843 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-07-240729250 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-27-240748312 bpk.exe File created C:\Windows\SysWOW64\dt\2024-10-10_22-29-38-240759312 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-59-240721218 bpk.exe File created C:\Windows\SysWOW64\pk.bin rinst.exe File opened for modification C:\Windows\SysWOW64\pk.bin bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-01-240662875 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-28-37-240699156 bpk.exe File created C:\Windows\SysWOW64\dt\th_2024-10-10_22-27-56-240657875 bpk.exe -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\msedge.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\svchost.com 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys 32108B~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 32108B~1.EXE -
NSIS installer 1 IoCs
resource yara_rule behavioral2/files/0x000b000000023b7b-1306.dat nsis_installer_1 -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE\ = "IE Class" bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings rinst.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0\win32 bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0\0 bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\Version = "1.0" bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1E1B2879-88FF-11D3-8D96-D7ACAC95951A}\Programmable bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}\1.0 bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\ = "IE Plugin Class" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE.1\CLSID bpk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib\ = "{1E1B286C-88FF-11D3-8D96-D7ACAC95951A}" bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\TypeLib bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{1E1B2878-88FF-11D3-8D96-D7ACAC95951A}\ = "IViewSource" bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\PK.IE bpk.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\TypeLib\{1E1B286C-88FF-11D3-8D96-D7ACAC95951A} bpk.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings 32108B~1.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 8 bpk.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 8 bpk.exe 8 bpk.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe 8 bpk.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4816 wrote to memory of 3112 4816 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 86 PID 4816 wrote to memory of 3112 4816 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 86 PID 4816 wrote to memory of 3112 4816 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 86 PID 3112 wrote to memory of 3368 3112 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 87 PID 3112 wrote to memory of 3368 3112 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 87 PID 3112 wrote to memory of 3368 3112 32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe 87 PID 3368 wrote to memory of 1280 3368 svchost.com 88 PID 3368 wrote to memory of 1280 3368 svchost.com 88 PID 3368 wrote to memory of 1280 3368 svchost.com 88 PID 1280 wrote to memory of 2620 1280 32108B~1.EXE 110 PID 1280 wrote to memory of 2620 1280 32108B~1.EXE 110 PID 1280 wrote to memory of 2620 1280 32108B~1.EXE 110 PID 2620 wrote to memory of 4460 2620 svchost.com 90 PID 2620 wrote to memory of 4460 2620 svchost.com 90 PID 2620 wrote to memory of 4460 2620 svchost.com 90 PID 4460 wrote to memory of 436 4460 32108B~1.EXE 111 PID 4460 wrote to memory of 436 4460 32108B~1.EXE 111 PID 4460 wrote to memory of 436 4460 32108B~1.EXE 111 PID 436 wrote to memory of 1344 436 svchost.com 92 PID 436 wrote to memory of 1344 436 svchost.com 92 PID 436 wrote to memory of 1344 436 svchost.com 92 PID 1344 wrote to memory of 2280 1344 32108B~1.EXE 93 PID 1344 wrote to memory of 2280 1344 32108B~1.EXE 93 PID 1344 wrote to memory of 2280 1344 32108B~1.EXE 93 PID 2280 wrote to memory of 232 2280 svchost.com 145 PID 2280 wrote to memory of 232 2280 svchost.com 145 PID 2280 wrote to memory of 232 2280 svchost.com 145 PID 232 wrote to memory of 3444 232 32108B~1.EXE 95 PID 232 wrote to memory of 3444 232 32108B~1.EXE 95 PID 232 wrote to memory of 3444 232 32108B~1.EXE 95 PID 3444 wrote to memory of 4780 3444 svchost.com 96 PID 3444 wrote to memory of 4780 3444 svchost.com 96 PID 3444 wrote to memory of 4780 3444 svchost.com 96 PID 4780 wrote to memory of 2540 4780 32108B~1.EXE 97 PID 4780 wrote to memory of 2540 4780 32108B~1.EXE 97 PID 4780 wrote to memory of 2540 4780 32108B~1.EXE 97 PID 2540 wrote to memory of 1308 2540 svchost.com 98 PID 2540 wrote to memory of 1308 2540 svchost.com 98 PID 2540 wrote to memory of 1308 2540 svchost.com 98 PID 1308 wrote to memory of 1584 1308 32108B~1.EXE 99 PID 1308 wrote to memory of 1584 1308 32108B~1.EXE 99 PID 1308 wrote to memory of 1584 1308 32108B~1.EXE 99 PID 1584 wrote to memory of 1716 1584 svchost.com 100 PID 1584 wrote to memory of 1716 1584 svchost.com 100 PID 1584 wrote to memory of 1716 1584 svchost.com 100 PID 1716 wrote to memory of 2708 1716 32108B~1.EXE 101 PID 1716 wrote to memory of 2708 1716 32108B~1.EXE 101 PID 1716 wrote to memory of 2708 1716 32108B~1.EXE 101 PID 2708 wrote to memory of 2216 2708 svchost.com 102 PID 2708 wrote to memory of 2216 2708 svchost.com 102 PID 2708 wrote to memory of 2216 2708 svchost.com 102 PID 2216 wrote to memory of 3604 2216 32108B~1.EXE 103 PID 2216 wrote to memory of 3604 2216 32108B~1.EXE 103 PID 2216 wrote to memory of 3604 2216 32108B~1.EXE 103 PID 3604 wrote to memory of 3136 3604 svchost.com 104 PID 3604 wrote to memory of 3136 3604 svchost.com 104 PID 3604 wrote to memory of 3136 3604 svchost.com 104 PID 3136 wrote to memory of 736 3136 32108B~1.EXE 105 PID 3136 wrote to memory of 736 3136 32108B~1.EXE 105 PID 3136 wrote to memory of 736 3136 32108B~1.EXE 105 PID 736 wrote to memory of 4900 736 svchost.com 196 PID 736 wrote to memory of 4900 736 svchost.com 196 PID 736 wrote to memory of 4900 736 svchost.com 196 PID 4900 wrote to memory of 4280 4900 32108B~1.EXE 164
Processes
-
C:\Users\Admin\AppData\Local\Temp\32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\32108bd2710ad6e446e2a9ae7c56bff6_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"15⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE16⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3136 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1336 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE26⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"27⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4084 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"29⤵
- Executes dropped EXE
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"31⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE32⤵
- Executes dropped EXE
PID:3744 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"33⤵
- Executes dropped EXE
PID:4652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE34⤵
- Executes dropped EXE
PID:1016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"35⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:4916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"37⤵
- Executes dropped EXE
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE38⤵
- Executes dropped EXE
PID:5048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"39⤵
- Executes dropped EXE
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
PID:2752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"41⤵
- Executes dropped EXE
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE42⤵
- Executes dropped EXE
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"43⤵
- Executes dropped EXE
PID:3156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:3204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"45⤵
- Executes dropped EXE
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE46⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"47⤵
- Executes dropped EXE
PID:4648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE48⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:5080 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE50⤵
- Executes dropped EXE
PID:3312 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"51⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"53⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2528 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"55⤵
- Executes dropped EXE
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:4804 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"57⤵
- Executes dropped EXE
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:2948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"61⤵
- Executes dropped EXE
PID:232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE62⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:672 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"63⤵
- Executes dropped EXE
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE64⤵
- Executes dropped EXE
PID:2980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"65⤵
- Executes dropped EXE
PID:3076 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE66⤵PID:2120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"67⤵
- System Location Discovery: System Language Discovery
PID:4028 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE68⤵PID:1664
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"69⤵
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE70⤵PID:4980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"71⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE72⤵
- Checks computer location settings
- Drops file in Windows directory
PID:1920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"73⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE74⤵
- Modifies registry class
PID:3484 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"75⤵
- Drops file in Windows directory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE76⤵
- Modifies registry class
PID:4800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE78⤵
- Drops file in Windows directory
PID:2272 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"79⤵
- Drops file in Windows directory
PID:4900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE80⤵PID:4280
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"81⤵PID:3196
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE82⤵PID:4460
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE84⤵PID:2424
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"85⤵
- Drops file in Windows directory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE86⤵
- System Location Discovery: System Language Discovery
PID:4012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"87⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE88⤵
- System Location Discovery: System Language Discovery
PID:4204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"89⤵
- Drops file in Windows directory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE90⤵
- Modifies registry class
PID:4164 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"91⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE92⤵PID:672
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"93⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE94⤵
- Checks computer location settings
PID:1360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"95⤵PID:3656
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE96⤵
- Checks computer location settings
PID:4916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"97⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE98⤵
- System Location Discovery: System Language Discovery
PID:4636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"99⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE100⤵
- Modifies registry class
PID:1548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"101⤵PID:928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE102⤵
- Drops file in Windows directory
PID:4684 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE104⤵PID:1812
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"105⤵PID:4124
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE106⤵PID:3864
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"107⤵PID:3096
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"109⤵PID:2176
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE110⤵
- Drops file in Windows directory
- Modifies registry class
PID:4644 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"111⤵
- System Location Discovery: System Language Discovery
PID:3952 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE112⤵
- Checks computer location settings
PID:4900 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"113⤵PID:4036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE114⤵
- Modifies registry class
PID:920 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"115⤵PID:948
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE116⤵
- Modifies registry class
PID:2004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"117⤵
- System Location Discovery: System Language Discovery
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE118⤵
- Checks computer location settings
PID:2400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"119⤵PID:4940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE120⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE"121⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\32108B~1.EXE122⤵
- Checks computer location settings
PID:3436
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-