Analysis
-
max time kernel
141s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-10-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe
-
Size
242KB
-
MD5
4668f88c02b5fbf98316a17eccf6a220
-
SHA1
6b326ac6b389fc09939db609ff8e2c525a7916bf
-
SHA256
e65db561681f6da6967d62a399aaa46db04c89ea12a234f2f33685d44530186d
-
SHA512
a2434b9a975ef429e33e3ce6ae97184eae414c89e2fc64341d2c9c14c23b06eb471ac593103a488827b0fa4694340d2dfaaef5c5ce0c6a48d25b7864a6ede7c8
-
SSDEEP
6144:byH7xOc6H5c6HcT66vlmrIzZHfsvwLQUePSeqTFyH7xOc6H5c6HcT66vlmr+UePH:bazzZ/svwzePSRa+ePSK
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Executes dropped EXE 64 IoCs
Processes:
svchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEpid Process 2740 svchost.exe 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2548 svchost.exe 2732 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2712 svchost.exe 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2360 svchost.com 828 4668F8~1.EXE 2896 svchost.com 2924 4668F8~1.EXE 3048 svchost.com 2800 4668F8~1.EXE 328 svchost.com 2792 4668F8~1.EXE 1780 svchost.com 2816 4668F8~1.EXE 992 svchost.com 1496 4668F8~1.EXE 2520 svchost.com 2192 4668F8~1.EXE 1156 svchost.com 2488 4668F8~1.EXE 1148 svchost.com 2044 4668F8~1.EXE 1772 svchost.com 1444 4668F8~1.EXE 2232 svchost.com 276 4668F8~1.EXE 2776 svchost.com 2832 4668F8~1.EXE 1512 svchost.com 2960 4668F8~1.EXE 2564 svchost.com 2568 4668F8~1.EXE 2596 svchost.com 2616 4668F8~1.EXE 2664 svchost.com 2036 4668F8~1.EXE 1924 svchost.com 2876 4668F8~1.EXE 2916 svchost.com 3016 4668F8~1.EXE 2928 svchost.com 1280 4668F8~1.EXE 1644 svchost.com 1220 4668F8~1.EXE 2528 svchost.com 924 4668F8~1.EXE 2292 svchost.com 1876 4668F8~1.EXE 2884 svchost.com 1436 4668F8~1.EXE 1892 svchost.com 2976 4668F8~1.EXE 2796 svchost.com 1300 4668F8~1.EXE 2304 svchost.com 2424 4668F8~1.EXE 748 svchost.com 1696 4668F8~1.EXE 2348 svchost.com 1832 4668F8~1.EXE 1776 svchost.com 892 4668F8~1.EXE -
Loads dropped DLL 64 IoCs
Processes:
svchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.compid Process 2740 svchost.exe 2740 svchost.exe 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2712 svchost.exe 2712 svchost.exe 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2360 svchost.com 2360 svchost.com 2896 svchost.com 2896 svchost.com 3048 svchost.com 3048 svchost.com 328 svchost.com 328 svchost.com 1780 svchost.com 1780 svchost.com 992 svchost.com 992 svchost.com 2520 svchost.com 2520 svchost.com 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 1156 svchost.com 1156 svchost.com 1148 svchost.com 1148 svchost.com 1772 svchost.com 1772 svchost.com 2232 svchost.com 2232 svchost.com 2776 svchost.com 2776 svchost.com 1512 svchost.com 1512 svchost.com 2564 svchost.com 2564 svchost.com 2596 svchost.com 2596 svchost.com 2664 svchost.com 2664 svchost.com 1924 svchost.com 1924 svchost.com 2916 svchost.com 2916 svchost.com 2928 svchost.com 2928 svchost.com 1644 svchost.com 1644 svchost.com 2528 svchost.com 2528 svchost.com 2292 svchost.com 2292 svchost.com 2884 svchost.com 2884 svchost.com 1892 svchost.com 1892 svchost.com 2796 svchost.com 2796 svchost.com 2304 svchost.com -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exedescription ioc Process File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jdb.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jinfo.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~3.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jcmd.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\idlj.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\BCSSync.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\CNFNOT32.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javafxpackager.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\apt.exe svchost.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\extcheck.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ADOBEC~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\ImagingDevices.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\javac.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GO664E~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WORDICON.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOOGLE~4.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DWTRIG20.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jmc.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.151\GOBD5D~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOICONS.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk1.7.0_80\bin\jabswitch.exe svchost.exe -
Drops file in Windows directory 64 IoCs
Processes:
4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEdescription ioc Process File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.comsvchost.comsvchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXEdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE -
Modifies registry class 1 IoCs
Processes:
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEdescription pid Process procid_target PID 2684 wrote to memory of 2740 2684 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2740 2684 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2740 2684 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 31 PID 2684 wrote to memory of 2740 2684 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 31 PID 2740 wrote to memory of 2416 2740 svchost.exe 32 PID 2740 wrote to memory of 2416 2740 svchost.exe 32 PID 2740 wrote to memory of 2416 2740 svchost.exe 32 PID 2740 wrote to memory of 2416 2740 svchost.exe 32 PID 2416 wrote to memory of 2732 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2732 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2732 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 34 PID 2416 wrote to memory of 2732 2416 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 34 PID 2732 wrote to memory of 2712 2732 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2712 2732 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2712 2732 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 35 PID 2732 wrote to memory of 2712 2732 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 35 PID 2712 wrote to memory of 2560 2712 svchost.exe 36 PID 2712 wrote to memory of 2560 2712 svchost.exe 36 PID 2712 wrote to memory of 2560 2712 svchost.exe 36 PID 2712 wrote to memory of 2560 2712 svchost.exe 36 PID 2560 wrote to memory of 2360 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 37 PID 2560 wrote to memory of 2360 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 37 PID 2560 wrote to memory of 2360 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 37 PID 2560 wrote to memory of 2360 2560 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 37 PID 2360 wrote to memory of 828 2360 svchost.com 38 PID 2360 wrote to memory of 828 2360 svchost.com 38 PID 2360 wrote to memory of 828 2360 svchost.com 38 PID 2360 wrote to memory of 828 2360 svchost.com 38 PID 828 wrote to memory of 2896 828 4668F8~1.EXE 39 PID 828 wrote to memory of 2896 828 4668F8~1.EXE 39 PID 828 wrote to memory of 2896 828 4668F8~1.EXE 39 PID 828 wrote to memory of 2896 828 4668F8~1.EXE 39 PID 2896 wrote to memory of 2924 2896 svchost.com 40 PID 2896 wrote to memory of 2924 2896 svchost.com 40 PID 2896 wrote to memory of 2924 2896 svchost.com 40 PID 2896 wrote to memory of 2924 2896 svchost.com 40 PID 2924 wrote to memory of 3048 2924 4668F8~1.EXE 41 PID 2924 wrote to memory of 3048 2924 4668F8~1.EXE 41 PID 2924 wrote to memory of 3048 2924 4668F8~1.EXE 41 PID 2924 wrote to memory of 3048 2924 4668F8~1.EXE 41 PID 3048 wrote to memory of 2800 3048 svchost.com 42 PID 3048 wrote to memory of 2800 3048 svchost.com 42 PID 3048 wrote to memory of 2800 3048 svchost.com 42 PID 3048 wrote to memory of 2800 3048 svchost.com 42 PID 2800 wrote to memory of 328 2800 4668F8~1.EXE 43 PID 2800 wrote to memory of 328 2800 4668F8~1.EXE 43 PID 2800 wrote to memory of 328 2800 4668F8~1.EXE 43 PID 2800 wrote to memory of 328 2800 4668F8~1.EXE 43 PID 328 wrote to memory of 2792 328 svchost.com 44 PID 328 wrote to memory of 2792 328 svchost.com 44 PID 328 wrote to memory of 2792 328 svchost.com 44 PID 328 wrote to memory of 2792 328 svchost.com 44 PID 2792 wrote to memory of 1780 2792 4668F8~1.EXE 45 PID 2792 wrote to memory of 1780 2792 4668F8~1.EXE 45 PID 2792 wrote to memory of 1780 2792 4668F8~1.EXE 45 PID 2792 wrote to memory of 1780 2792 4668F8~1.EXE 45 PID 1780 wrote to memory of 2816 1780 svchost.com 46 PID 1780 wrote to memory of 2816 1780 svchost.com 46 PID 1780 wrote to memory of 2816 1780 svchost.com 46 PID 1780 wrote to memory of 2816 1780 svchost.com 46 PID 2816 wrote to memory of 992 2816 4668F8~1.EXE 47 PID 2816 wrote to memory of 992 2816 4668F8~1.EXE 47 PID 2816 wrote to memory of 992 2816 4668F8~1.EXE 47 PID 2816 wrote to memory of 992 2816 4668F8~1.EXE 47
Processes
-
C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"17⤵
- Executes dropped EXE
- Loads dropped DLL
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE18⤵
- Executes dropped EXE
PID:1496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"19⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE20⤵
- Executes dropped EXE
PID:2192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE24⤵
- Executes dropped EXE
PID:2044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE26⤵
- Executes dropped EXE
PID:1444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"27⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE28⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:276 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE30⤵
- Executes dropped EXE
PID:2832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"31⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE32⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"33⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE34⤵
- Executes dropped EXE
PID:2568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"35⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE36⤵
- Executes dropped EXE
PID:2616 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"37⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"39⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE40⤵
- Executes dropped EXE
PID:2876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"41⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE42⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3016 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"43⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE44⤵
- Executes dropped EXE
PID:1280 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"45⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"47⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE48⤵
- Executes dropped EXE
PID:924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"49⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE50⤵
- Executes dropped EXE
PID:1876 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"51⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1436 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"53⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE54⤵
- Executes dropped EXE
PID:2976 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"55⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE56⤵
- Executes dropped EXE
PID:1300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"57⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE58⤵
- Executes dropped EXE
PID:2424 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"59⤵
- Executes dropped EXE
PID:748 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE60⤵
- Executes dropped EXE
PID:1696 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"61⤵
- Executes dropped EXE
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE62⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"63⤵
- Executes dropped EXE
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE64⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:892 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"65⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE66⤵PID:2196
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"67⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE68⤵PID:2476
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"69⤵PID:1624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE70⤵PID:1692
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"71⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE72⤵PID:2136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"73⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE74⤵PID:2684
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE76⤵PID:1500
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE78⤵
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"79⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE80⤵
- Drops file in Windows directory
PID:2840 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"81⤵PID:2108
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE82⤵PID:2592
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"83⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE84⤵
- Drops file in Windows directory
PID:1172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"85⤵PID:3036
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE86⤵PID:2008
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"87⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE88⤵
- System Location Discovery: System Language Discovery
PID:2936 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"89⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE90⤵PID:2016
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"91⤵PID:2928
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE92⤵PID:2404
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"93⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE94⤵PID:1820
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"95⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE96⤵PID:2880
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"97⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE98⤵PID:2816
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"99⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE100⤵PID:992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"101⤵PID:1232
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE102⤵PID:2904
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"103⤵
- System Location Discovery: System Language Discovery
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE104⤵PID:1928
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"105⤵
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE106⤵PID:1156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"107⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE108⤵PID:2488
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"109⤵PID:1320
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE110⤵PID:832
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"111⤵PID:372
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE112⤵PID:1192
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"113⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE114⤵
- System Location Discovery: System Language Discovery
PID:760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"115⤵
- Drops file in Windows directory
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE116⤵PID:2992
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"117⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE118⤵PID:984
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"119⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE120⤵
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"121⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE122⤵PID:2836
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-