Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
15-10-2024 07:07
Static task
static1
Behavioral task
behavioral1
Sample
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe
-
Size
242KB
-
MD5
4668f88c02b5fbf98316a17eccf6a220
-
SHA1
6b326ac6b389fc09939db609ff8e2c525a7916bf
-
SHA256
e65db561681f6da6967d62a399aaa46db04c89ea12a234f2f33685d44530186d
-
SHA512
a2434b9a975ef429e33e3ce6ae97184eae414c89e2fc64341d2c9c14c23b06eb471ac593103a488827b0fa4694340d2dfaaef5c5ce0c6a48d25b7864a6ede7c8
-
SSDEEP
6144:byH7xOc6H5c6HcT66vlmrIzZHfsvwLQUePSeqTFyH7xOc6H5c6HcT66vlmr+UePH:bazzZ/svwzePSRa+ePSK
Malware Config
Signatures
-
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEdescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\International\Geo\Nation 4668F8~1.EXE -
Executes dropped EXE 64 IoCs
Processes:
svchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEpid Process 1380 svchost.exe 4264 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 1140 svchost.exe 1060 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 4420 svchost.exe 2220 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 1436 svchost.com 1996 4668F8~1.EXE 1928 svchost.com 4204 4668F8~1.EXE 1352 svchost.com 4208 4668F8~1.EXE 512 svchost.com 1968 4668F8~1.EXE 1732 svchost.com 516 4668F8~1.EXE 3576 svchost.com 3044 4668F8~1.EXE 5008 svchost.com 4704 4668F8~1.EXE 3308 svchost.com 4344 4668F8~1.EXE 5036 svchost.com 4872 4668F8~1.EXE 1964 svchost.com 2432 4668F8~1.EXE 4924 svchost.com 1488 4668F8~1.EXE 3676 svchost.com 1332 4668F8~1.EXE 4136 svchost.com 2064 4668F8~1.EXE 1772 svchost.com 3408 4668F8~1.EXE 744 svchost.com 1048 4668F8~1.EXE 540 svchost.com 4004 4668F8~1.EXE 1824 svchost.com 4996 4668F8~1.EXE 3044 svchost.com 4440 4668F8~1.EXE 2044 svchost.com 1704 4668F8~1.EXE 216 svchost.com 2964 4668F8~1.EXE 2652 svchost.com 3956 4668F8~1.EXE 8 svchost.com 3688 4668F8~1.EXE 1692 svchost.com 2788 4668F8~1.EXE 428 svchost.com 1224 4668F8~1.EXE 5112 svchost.com 1764 4668F8~1.EXE 5108 svchost.com 816 4668F8~1.EXE 3332 svchost.com 1604 4668F8~1.EXE 1064 svchost.com 1776 4668F8~1.EXE 4956 svchost.com 860 4668F8~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
Processes:
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exedescription ioc Process File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jmap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\NOTIFI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaws.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javaw.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\ADOBEA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\JAVAPA~1\javaw.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jdeps.exe svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{4D8DC~1\VC_RED~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
Processes:
svchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.comdescription ioc Process File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\directx.sys 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com 4668F8~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
svchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXE4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.comsvchost.com4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEsvchost.comsvchost.com4668F8~1.EXEsvchost.comdescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4668F8~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
Processes:
4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXE4668F8~1.EXEdescription ioc Process Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE Key created \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000_Classes\Local Settings 4668F8~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.exe4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exesvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEsvchost.com4668F8~1.EXEdescription pid Process procid_target PID 3688 wrote to memory of 1380 3688 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 84 PID 3688 wrote to memory of 1380 3688 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 84 PID 3688 wrote to memory of 1380 3688 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 84 PID 1380 wrote to memory of 4264 1380 svchost.exe 85 PID 1380 wrote to memory of 4264 1380 svchost.exe 85 PID 1380 wrote to memory of 4264 1380 svchost.exe 85 PID 4264 wrote to memory of 1060 4264 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 88 PID 4264 wrote to memory of 1060 4264 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 88 PID 4264 wrote to memory of 1060 4264 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 88 PID 1060 wrote to memory of 4420 1060 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 89 PID 1060 wrote to memory of 4420 1060 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 89 PID 1060 wrote to memory of 4420 1060 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 89 PID 4420 wrote to memory of 2220 4420 svchost.exe 91 PID 4420 wrote to memory of 2220 4420 svchost.exe 91 PID 4420 wrote to memory of 2220 4420 svchost.exe 91 PID 2220 wrote to memory of 1436 2220 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 92 PID 2220 wrote to memory of 1436 2220 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 92 PID 2220 wrote to memory of 1436 2220 4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe 92 PID 1436 wrote to memory of 1996 1436 svchost.com 93 PID 1436 wrote to memory of 1996 1436 svchost.com 93 PID 1436 wrote to memory of 1996 1436 svchost.com 93 PID 1996 wrote to memory of 1928 1996 4668F8~1.EXE 95 PID 1996 wrote to memory of 1928 1996 4668F8~1.EXE 95 PID 1996 wrote to memory of 1928 1996 4668F8~1.EXE 95 PID 1928 wrote to memory of 4204 1928 svchost.com 96 PID 1928 wrote to memory of 4204 1928 svchost.com 96 PID 1928 wrote to memory of 4204 1928 svchost.com 96 PID 4204 wrote to memory of 1352 4204 4668F8~1.EXE 97 PID 4204 wrote to memory of 1352 4204 4668F8~1.EXE 97 PID 4204 wrote to memory of 1352 4204 4668F8~1.EXE 97 PID 1352 wrote to memory of 4208 1352 svchost.com 98 PID 1352 wrote to memory of 4208 1352 svchost.com 98 PID 1352 wrote to memory of 4208 1352 svchost.com 98 PID 4208 wrote to memory of 512 4208 4668F8~1.EXE 99 PID 4208 wrote to memory of 512 4208 4668F8~1.EXE 99 PID 4208 wrote to memory of 512 4208 4668F8~1.EXE 99 PID 512 wrote to memory of 1968 512 svchost.com 100 PID 512 wrote to memory of 1968 512 svchost.com 100 PID 512 wrote to memory of 1968 512 svchost.com 100 PID 1968 wrote to memory of 1732 1968 4668F8~1.EXE 101 PID 1968 wrote to memory of 1732 1968 4668F8~1.EXE 101 PID 1968 wrote to memory of 1732 1968 4668F8~1.EXE 101 PID 1732 wrote to memory of 516 1732 svchost.com 102 PID 1732 wrote to memory of 516 1732 svchost.com 102 PID 1732 wrote to memory of 516 1732 svchost.com 102 PID 516 wrote to memory of 3576 516 4668F8~1.EXE 103 PID 516 wrote to memory of 3576 516 4668F8~1.EXE 103 PID 516 wrote to memory of 3576 516 4668F8~1.EXE 103 PID 3576 wrote to memory of 3044 3576 svchost.com 127 PID 3576 wrote to memory of 3044 3576 svchost.com 127 PID 3576 wrote to memory of 3044 3576 svchost.com 127 PID 3044 wrote to memory of 5008 3044 4668F8~1.EXE 105 PID 3044 wrote to memory of 5008 3044 4668F8~1.EXE 105 PID 3044 wrote to memory of 5008 3044 4668F8~1.EXE 105 PID 5008 wrote to memory of 4704 5008 svchost.com 106 PID 5008 wrote to memory of 4704 5008 svchost.com 106 PID 5008 wrote to memory of 4704 5008 svchost.com 106 PID 4704 wrote to memory of 3308 4704 4668F8~1.EXE 107 PID 4704 wrote to memory of 3308 4704 4668F8~1.EXE 107 PID 4704 wrote to memory of 3308 4704 4668F8~1.EXE 107 PID 3308 wrote to memory of 4344 3308 svchost.com 108 PID 3308 wrote to memory of 4344 3308 svchost.com 108 PID 3308 wrote to memory of 4344 3308 svchost.com 108 PID 4344 wrote to memory of 5036 4344 4668F8~1.EXE 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3688 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\4668f88c02b5fbf98316a17eccf6a220_JaffaCakes118.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"9⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE14⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE18⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3308 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"23⤵
- Executes dropped EXE
PID:5036 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"27⤵
- Executes dropped EXE
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1488 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"29⤵
- Executes dropped EXE
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:1332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"31⤵
- Executes dropped EXE
PID:4136 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE32⤵
- Executes dropped EXE
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"33⤵
- Executes dropped EXE
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE34⤵
- Executes dropped EXE
- Modifies registry class
PID:3408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"35⤵
- Executes dropped EXE
PID:744 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE36⤵
- Executes dropped EXE
PID:1048 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"37⤵
- Executes dropped EXE
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE38⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"39⤵
- Executes dropped EXE
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE40⤵
- Executes dropped EXE
PID:4996 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"41⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"43⤵
- Executes dropped EXE
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1704 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"47⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:3956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"49⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:8 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE50⤵
- Executes dropped EXE
PID:3688 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"51⤵
- Executes dropped EXE
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE52⤵
- Checks computer location settings
- Executes dropped EXE
PID:2788 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"53⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:428 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE54⤵
- Executes dropped EXE
PID:1224 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"55⤵
- Executes dropped EXE
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"57⤵
- Executes dropped EXE
PID:5108 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE58⤵
- Executes dropped EXE
PID:816 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"59⤵
- Executes dropped EXE
PID:3332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE60⤵
- Executes dropped EXE
PID:1604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"61⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE62⤵
- Executes dropped EXE
PID:1776 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"63⤵
- Executes dropped EXE
PID:4956 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE64⤵
- Executes dropped EXE
PID:860 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"65⤵PID:3720
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE66⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"67⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE68⤵
- Drops file in Windows directory
PID:536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"69⤵PID:3032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE70⤵
- Modifies registry class
PID:3468 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"71⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE72⤵
- Modifies registry class
PID:1416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"73⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE74⤵PID:3704
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE76⤵
- Checks computer location settings
PID:4356 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"77⤵
- System Location Discovery: System Language Discovery
PID:468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE78⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3088 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"79⤵
- Drops file in Windows directory
PID:4568 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE80⤵
- Checks computer location settings
PID:1408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"81⤵PID:4992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE82⤵
- Checks computer location settings
PID:4412 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"83⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE84⤵
- Checks computer location settings
PID:4492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE86⤵
- Checks computer location settings
PID:5020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"87⤵PID:4624
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE88⤵
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"89⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE90⤵
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"91⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE92⤵PID:516
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE94⤵
- Checks computer location settings
PID:3576 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"95⤵PID:2628
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE96⤵
- Checks computer location settings
- Drops file in Windows directory
- Modifies registry class
PID:4960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"97⤵
- Drops file in Windows directory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE98⤵PID:980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"99⤵PID:4376
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE100⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4252 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"101⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE102⤵
- Modifies registry class
PID:1420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"103⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE104⤵
- Drops file in Windows directory
- Modifies registry class
PID:764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"105⤵PID:3352
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE106⤵
- Checks computer location settings
PID:5012 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"107⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE108⤵
- Modifies registry class
PID:1264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"109⤵PID:3644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE110⤵
- Modifies registry class
PID:3064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"111⤵PID:3636
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE112⤵
- Checks computer location settings
PID:5028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"113⤵
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1964 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"115⤵PID:2404
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE116⤵
- Modifies registry class
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"117⤵PID:4412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE118⤵
- Modifies registry class
PID:2760 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"119⤵PID:3568
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE120⤵PID:3236
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE"121⤵PID:816
-
C:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\4668F8~1.EXE122⤵
- Modifies registry class
PID:4520
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-