Analysis
-
max time kernel
92s -
max time network
93s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
11/10/2024, 23:54
Behavioral task
behavioral1
Sample
377294dbec391645cc1922146e98257b_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
377294dbec391645cc1922146e98257b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
377294dbec391645cc1922146e98257b_JaffaCakes118.exe
-
Size
202KB
-
MD5
377294dbec391645cc1922146e98257b
-
SHA1
f2dbf86efad0c2fd78725d6dac2bf1849ac07130
-
SHA256
c8ae06ec3589c2afaf531c61da43ad307f14d8b80aa552551121a1c703dd59b1
-
SHA512
77d0d0bf293c5d34e2540de1a88e839f9b1e1b1bdf0b3c7eb6105b7471fc32936b720e9d382216870335741988772da64c47f0295cfa249bf0fd0748beeda1d2
-
SSDEEP
3072:sr85CXzZ+pLS6h16zfMzN/O3zy/E6t0br59JYr85C:k9XzZ8XcEfS59y9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0008000000023c9f-4.dat family_neshta behavioral2/files/0x0007000000023ca0-11.dat family_neshta behavioral2/memory/4980-16-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/740-27-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3672-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4844-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/976-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3992-44-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2300-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4428-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3552-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4620-74-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4128-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3912-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2144-88-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3236-92-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000400000002033e-118.dat family_neshta behavioral2/files/0x00010000000202c4-116.dat family_neshta behavioral2/memory/2612-120-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2388-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3560-132-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3728-136-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5092-144-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1828-155-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0002000000020342-160.dat family_neshta behavioral2/memory/1800-162-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3008-178-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002150f-184.dat family_neshta behavioral2/files/0x0001000000021511-183.dat family_neshta behavioral2/files/0x0001000000022f6c-196.dat family_neshta behavioral2/files/0x00010000000167b7-203.dat family_neshta behavioral2/files/0x0001000000016809-201.dat family_neshta behavioral2/files/0x0001000000022f6f-195.dat family_neshta behavioral2/files/0x0001000000022fac-194.dat family_neshta behavioral2/files/0x000100000001dbde-216.dat family_neshta behavioral2/files/0x0001000000022f6a-193.dat family_neshta behavioral2/files/0x000100000001691b-226.dat family_neshta behavioral2/files/0x0001000000022f6e-192.dat family_neshta behavioral2/memory/5024-232-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4828-237-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5060-238-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4300-240-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1120-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3928-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3148-270-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2756-277-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1108-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4716-283-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2300-289-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2424-291-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4892-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5116-299-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4544-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5100-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4668-313-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2144-315-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3360-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1808-323-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5040-329-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2208-331-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3292-337-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3100-339-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2248-345-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4276-347-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294dbec391645cc1922146e98257b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation 377294~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2276 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 4980 svchost.com 740 377294~1.EXE 3672 svchost.com 4844 377294~1.EXE 976 svchost.com 3992 377294~1.EXE 2300 svchost.com 4428 377294~1.EXE 3552 svchost.com 4620 377294~1.EXE 4128 svchost.com 3912 377294~1.EXE 2144 svchost.com 3236 377294~1.EXE 2612 svchost.com 2388 377294~1.EXE 3560 svchost.com 3728 377294~1.EXE 5092 svchost.com 1828 377294~1.EXE 1800 svchost.com 3008 377294~1.EXE 5024 svchost.com 4828 377294~1.EXE 5060 svchost.com 4300 377294~1.EXE 1120 svchost.com 3928 377294~1.EXE 3148 svchost.com 2756 377294~1.EXE 1108 svchost.com 4716 377294~1.EXE 2300 svchost.com 2424 377294~1.EXE 4892 svchost.com 5116 377294~1.EXE 4544 svchost.com 5100 377294~1.EXE 4668 svchost.com 2144 377294~1.EXE 3360 svchost.com 1808 377294~1.EXE 5040 svchost.com 2208 377294~1.EXE 3292 svchost.com 3100 377294~1.EXE 2248 svchost.com 4276 377294~1.EXE 3720 svchost.com 1828 377294~1.EXE 3448 svchost.com 4720 377294~1.EXE 3268 svchost.com 4976 377294~1.EXE 3080 svchost.com 1916 377294~1.EXE 1648 svchost.com 636 377294~1.EXE 2488 svchost.com 1040 377294~1.EXE 3608 svchost.com 2024 377294~1.EXE 2900 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 377294dbec391645cc1922146e98257b_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\COOKIE~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\UNINST~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE 377294dbec391645cc1922146e98257b_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 377294dbec391645cc1922146e98257b_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 377294~1.EXE File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 377294~1.EXE File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 377294~1.EXE -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 377294dbec391645cc1922146e98257b_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings 377294~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1716 wrote to memory of 2276 1716 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 84 PID 1716 wrote to memory of 2276 1716 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 84 PID 1716 wrote to memory of 2276 1716 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 84 PID 2276 wrote to memory of 4980 2276 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 86 PID 2276 wrote to memory of 4980 2276 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 86 PID 2276 wrote to memory of 4980 2276 377294dbec391645cc1922146e98257b_JaffaCakes118.exe 86 PID 4980 wrote to memory of 740 4980 svchost.com 87 PID 4980 wrote to memory of 740 4980 svchost.com 87 PID 4980 wrote to memory of 740 4980 svchost.com 87 PID 740 wrote to memory of 3672 740 377294~1.EXE 88 PID 740 wrote to memory of 3672 740 377294~1.EXE 88 PID 740 wrote to memory of 3672 740 377294~1.EXE 88 PID 3672 wrote to memory of 4844 3672 svchost.com 89 PID 3672 wrote to memory of 4844 3672 svchost.com 89 PID 3672 wrote to memory of 4844 3672 svchost.com 89 PID 4844 wrote to memory of 976 4844 377294~1.EXE 90 PID 4844 wrote to memory of 976 4844 377294~1.EXE 90 PID 4844 wrote to memory of 976 4844 377294~1.EXE 90 PID 976 wrote to memory of 3992 976 svchost.com 91 PID 976 wrote to memory of 3992 976 svchost.com 91 PID 976 wrote to memory of 3992 976 svchost.com 91 PID 3992 wrote to memory of 2300 3992 377294~1.EXE 118 PID 3992 wrote to memory of 2300 3992 377294~1.EXE 118 PID 3992 wrote to memory of 2300 3992 377294~1.EXE 118 PID 2300 wrote to memory of 4428 2300 svchost.com 93 PID 2300 wrote to memory of 4428 2300 svchost.com 93 PID 2300 wrote to memory of 4428 2300 svchost.com 93 PID 4428 wrote to memory of 3552 4428 377294~1.EXE 94 PID 4428 wrote to memory of 3552 4428 377294~1.EXE 94 PID 4428 wrote to memory of 3552 4428 377294~1.EXE 94 PID 3552 wrote to memory of 4620 3552 svchost.com 95 PID 3552 wrote to memory of 4620 3552 svchost.com 95 PID 3552 wrote to memory of 4620 3552 svchost.com 95 PID 4620 wrote to memory of 4128 4620 377294~1.EXE 96 PID 4620 wrote to memory of 4128 4620 377294~1.EXE 96 PID 4620 wrote to memory of 4128 4620 377294~1.EXE 96 PID 4128 wrote to memory of 3912 4128 svchost.com 97 PID 4128 wrote to memory of 3912 4128 svchost.com 97 PID 4128 wrote to memory of 3912 4128 svchost.com 97 PID 3912 wrote to memory of 2144 3912 377294~1.EXE 203 PID 3912 wrote to memory of 2144 3912 377294~1.EXE 203 PID 3912 wrote to memory of 2144 3912 377294~1.EXE 203 PID 2144 wrote to memory of 3236 2144 svchost.com 99 PID 2144 wrote to memory of 3236 2144 svchost.com 99 PID 2144 wrote to memory of 3236 2144 svchost.com 99 PID 3236 wrote to memory of 2612 3236 377294~1.EXE 206 PID 3236 wrote to memory of 2612 3236 377294~1.EXE 206 PID 3236 wrote to memory of 2612 3236 377294~1.EXE 206 PID 2612 wrote to memory of 2388 2612 svchost.com 101 PID 2612 wrote to memory of 2388 2612 svchost.com 101 PID 2612 wrote to memory of 2388 2612 svchost.com 101 PID 2388 wrote to memory of 3560 2388 377294~1.EXE 102 PID 2388 wrote to memory of 3560 2388 377294~1.EXE 102 PID 2388 wrote to memory of 3560 2388 377294~1.EXE 102 PID 3560 wrote to memory of 3728 3560 svchost.com 167 PID 3560 wrote to memory of 3728 3560 svchost.com 167 PID 3560 wrote to memory of 3728 3560 svchost.com 167 PID 3728 wrote to memory of 5092 3728 377294~1.EXE 104 PID 3728 wrote to memory of 5092 3728 377294~1.EXE 104 PID 3728 wrote to memory of 5092 3728 377294~1.EXE 104 PID 5092 wrote to memory of 1828 5092 svchost.com 214 PID 5092 wrote to memory of 1828 5092 svchost.com 214 PID 5092 wrote to memory of 1828 5092 svchost.com 214 PID 1828 wrote to memory of 1800 1828 377294~1.EXE 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\377294dbec391645cc1922146e98257b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\377294dbec391645cc1922146e98257b_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294dbec391645cc1922146e98257b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\377294dbec391645cc1922146e98257b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4980 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"5⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3552 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4620 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE20⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"23⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3008 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:4300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"29⤵
- Executes dropped EXE
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"31⤵
- Executes dropped EXE
PID:3148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE32⤵
- Executes dropped EXE
- Modifies registry class
PID:2756 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"35⤵
- Executes dropped EXE
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE36⤵
- Executes dropped EXE
- Modifies registry class
PID:2424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE38⤵
- Executes dropped EXE
- Modifies registry class
PID:5116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"43⤵
- Executes dropped EXE
PID:3360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1808 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"45⤵
- Executes dropped EXE
PID:5040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
PID:2208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:3100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"51⤵
- Executes dropped EXE
PID:3720 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE52⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"53⤵
- Executes dropped EXE
PID:3448 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE54⤵
- Executes dropped EXE
PID:4720 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE56⤵
- Executes dropped EXE
PID:4976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"57⤵
- Executes dropped EXE
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1916 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"59⤵
- Executes dropped EXE
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:636 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"61⤵
- Executes dropped EXE
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE62⤵
- Executes dropped EXE
- Modifies registry class
PID:1040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"63⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3608 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE64⤵
- Executes dropped EXE
- Modifies registry class
PID:2024 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"65⤵
- Executes dropped EXE
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE66⤵
- Modifies registry class
PID:4736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"67⤵PID:4008
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE68⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:3144 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"69⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE70⤵
- Drops file in Windows directory
- Modifies registry class
PID:4068 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:4732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE72⤵
- Checks computer location settings
- Modifies registry class
PID:4728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"73⤵PID:312
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE74⤵
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"75⤵
- Drops file in Windows directory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE76⤵PID:4356
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE78⤵
- Checks computer location settings
PID:4764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"79⤵PID:3480
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE80⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"81⤵PID:4756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE82⤵
- Checks computer location settings
PID:3276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE84⤵
- Checks computer location settings
- Drops file in Windows directory
PID:3728 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:4280 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE86⤵
- Modifies registry class
PID:2324 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"87⤵PID:3184
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE88⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4156 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"89⤵
- Drops file in Windows directory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE90⤵PID:3092
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"91⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3268 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE92⤵
- Checks computer location settings
PID:2328 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"93⤵PID:3080
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:5104 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"95⤵
- Drops file in Windows directory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE96⤵PID:1128
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"97⤵PID:4192
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE98⤵
- Checks computer location settings
PID:4292 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"99⤵PID:4872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE100⤵
- Checks computer location settings
PID:4240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"101⤵PID:444
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE102⤵
- Modifies registry class
PID:1004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"103⤵PID:3300
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE104⤵PID:4840
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"105⤵
- Drops file in Windows directory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE106⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"107⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE108⤵
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"109⤵
- Drops file in Windows directory
PID:812 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE110⤵
- Modifies registry class
PID:3476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"111⤵PID:2424
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE112⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4428 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:3204 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"115⤵
- Drops file in Windows directory
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE116⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"117⤵PID:4448
-
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE118⤵PID:1492
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE120⤵PID:2144
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE"121⤵
- Drops file in Windows directory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\377294~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2148
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-