Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18/10/2024, 02:19
Static task
static1
Behavioral task
behavioral1
Sample
54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe
-
Size
199KB
-
MD5
54f18252d65c0a4dcdf360055fd4bf82
-
SHA1
1ce81d8323d11e7b03421ce4030588026a6a81e7
-
SHA256
33e2695da4fe975e3945b6aafc539ef6ad61c4916b30b00bb5454fc4a9286d6c
-
SHA512
d4ba259bd8538c41e9a2c3c510f646edf9508afe1aac66717b7cf463ae7d61401e199378a6a8f0072cdc320a17595308e6f3a3ec02ef0866c66e3d2369951afa
-
SSDEEP
3072:oWkwzgGtfU6MW8zpoLJ+Fky0jwHPzoam2oxpy3PUszw+IyJ9EmOzFUO7QP7OLxRs:ogUJx2gRaA+mpmid
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 64 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe Set value (int) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" reg.exe -
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Renames multiple (57) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Control Panel\International\Geo\Nation SUIEcMEI.exe -
Deletes itself 1 IoCs
pid Process 688 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2120 SUIEcMEI.exe 2708 PWgkEYYY.exe -
Loads dropped DLL 20 IoCs
pid Process 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\SUIEcMEI.exe = "C:\\Users\\Admin\\lAwUUQco\\SUIEcMEI.exe" SUIEcMEI.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PWgkEYYY.exe = "C:\\ProgramData\\XMEQoIQs\\PWgkEYYY.exe" PWgkEYYY.exe Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\SUIEcMEI.exe = "C:\\Users\\Admin\\lAwUUQco\\SUIEcMEI.exe" 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\PWgkEYYY.exe = "C:\\ProgramData\\XMEQoIQs\\PWgkEYYY.exe" 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification \??\c:\windows\installer\{ac76ba86-7ad7-1033-7b44-a90000000001}\pdffile_8.ico SUIEcMEI.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry key 1 TTPs 64 IoCs
pid Process 2684 reg.exe 1440 reg.exe 1616 reg.exe 2504 reg.exe 1976 reg.exe 2616 reg.exe 2780 reg.exe 2004 reg.exe 1624 reg.exe 1852 reg.exe 2820 reg.exe 1384 reg.exe 872 reg.exe 2864 reg.exe 2780 reg.exe 2576 reg.exe 340 reg.exe 2624 reg.exe 2588 reg.exe 2176 reg.exe 1528 reg.exe 2800 reg.exe 2660 reg.exe 2664 reg.exe 1632 reg.exe 548 reg.exe 2168 reg.exe 2620 reg.exe 2892 reg.exe 2100 reg.exe 276 reg.exe 2100 reg.exe 2264 reg.exe 1212 reg.exe 2368 reg.exe 3016 reg.exe 1640 reg.exe 2736 reg.exe 2388 reg.exe 776 reg.exe 1624 reg.exe 2328 reg.exe 1944 reg.exe 2964 reg.exe 2356 reg.exe 3008 reg.exe 2344 reg.exe 2804 reg.exe 3000 reg.exe 2248 reg.exe 2260 reg.exe 2192 reg.exe 2696 reg.exe 2128 reg.exe 1772 reg.exe 2052 reg.exe 340 reg.exe 576 reg.exe 3016 reg.exe 2520 reg.exe 2916 reg.exe 2744 reg.exe 1416 reg.exe 2792 reg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 112 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 112 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 604 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 604 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2132 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2132 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1672 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1672 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2676 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2676 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2720 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2720 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 676 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 676 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2204 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2204 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2212 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2212 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2964 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2964 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2768 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2768 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 468 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 468 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 776 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 776 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1544 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1544 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1764 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1764 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2996 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2996 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2524 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2524 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2284 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2284 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2072 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2072 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1300 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1300 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2916 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2916 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1012 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1012 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2764 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2764 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1748 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1748 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1256 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1256 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 784 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 784 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2752 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2752 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2576 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 2576 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1632 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 1632 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 3016 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 3016 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2120 SUIEcMEI.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe 2120 SUIEcMEI.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2120 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2120 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2120 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2120 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 31 PID 2268 wrote to memory of 2708 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 32 PID 2268 wrote to memory of 2708 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 32 PID 2268 wrote to memory of 2708 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 32 PID 2268 wrote to memory of 2708 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 32 PID 2268 wrote to memory of 2780 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 33 PID 2268 wrote to memory of 2780 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 33 PID 2268 wrote to memory of 2780 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 33 PID 2268 wrote to memory of 2780 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 33 PID 2268 wrote to memory of 2576 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 35 PID 2268 wrote to memory of 2576 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 35 PID 2268 wrote to memory of 2576 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 35 PID 2268 wrote to memory of 2576 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 35 PID 2268 wrote to memory of 2328 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 36 PID 2268 wrote to memory of 2328 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 36 PID 2268 wrote to memory of 2328 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 36 PID 2268 wrote to memory of 2328 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 36 PID 2268 wrote to memory of 2744 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 37 PID 2268 wrote to memory of 2744 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 37 PID 2268 wrote to memory of 2744 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 37 PID 2268 wrote to memory of 2744 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 37 PID 2268 wrote to memory of 2552 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 38 PID 2268 wrote to memory of 2552 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 38 PID 2268 wrote to memory of 2552 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 38 PID 2268 wrote to memory of 2552 2268 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 38 PID 2780 wrote to memory of 2628 2780 cmd.exe 42 PID 2780 wrote to memory of 2628 2780 cmd.exe 42 PID 2780 wrote to memory of 2628 2780 cmd.exe 42 PID 2780 wrote to memory of 2628 2780 cmd.exe 42 PID 2552 wrote to memory of 3016 2552 cmd.exe 44 PID 2552 wrote to memory of 3016 2552 cmd.exe 44 PID 2552 wrote to memory of 3016 2552 cmd.exe 44 PID 2552 wrote to memory of 3016 2552 cmd.exe 44 PID 2628 wrote to memory of 624 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 45 PID 2628 wrote to memory of 624 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 45 PID 2628 wrote to memory of 624 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 45 PID 2628 wrote to memory of 624 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 45 PID 624 wrote to memory of 112 624 cmd.exe 47 PID 624 wrote to memory of 112 624 cmd.exe 47 PID 624 wrote to memory of 112 624 cmd.exe 47 PID 624 wrote to memory of 112 624 cmd.exe 47 PID 2628 wrote to memory of 1632 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 48 PID 2628 wrote to memory of 1632 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 48 PID 2628 wrote to memory of 1632 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 48 PID 2628 wrote to memory of 1632 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 48 PID 2628 wrote to memory of 1616 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 49 PID 2628 wrote to memory of 1616 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 49 PID 2628 wrote to memory of 1616 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 49 PID 2628 wrote to memory of 1616 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 49 PID 2628 wrote to memory of 2368 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 51 PID 2628 wrote to memory of 2368 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 51 PID 2628 wrote to memory of 2368 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 51 PID 2628 wrote to memory of 2368 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 51 PID 2628 wrote to memory of 1904 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 53 PID 2628 wrote to memory of 1904 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 53 PID 2628 wrote to memory of 1904 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 53 PID 2628 wrote to memory of 1904 2628 54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe 53 PID 1904 wrote to memory of 776 1904 cmd.exe 56 PID 1904 wrote to memory of 776 1904 cmd.exe 56 PID 1904 wrote to memory of 776 1904 cmd.exe 56 PID 1904 wrote to memory of 776 1904 cmd.exe 56
Processes
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\lAwUUQco\SUIEcMEI.exe"C:\Users\Admin\lAwUUQco\SUIEcMEI.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
PID:2120
-
-
C:\ProgramData\XMEQoIQs\PWgkEYYY.exe"C:\ProgramData\XMEQoIQs\PWgkEYYY.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2708
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"2⤵
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes1183⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"4⤵
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes1185⤵
- Suspicious behavior: EnumeratesProcesses
PID:112 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"6⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes1187⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:604 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"8⤵PID:1440
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes1189⤵
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"10⤵PID:2064
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11811⤵
- Suspicious behavior: EnumeratesProcesses
PID:1672 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"12⤵PID:2024
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11813⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"14⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11815⤵
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"16⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11817⤵
- Suspicious behavior: EnumeratesProcesses
PID:676 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"18⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11819⤵
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"20⤵PID:540
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11821⤵
- Suspicious behavior: EnumeratesProcesses
PID:2212 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"22⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11823⤵
- Suspicious behavior: EnumeratesProcesses
PID:2964 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"24⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11825⤵
- Suspicious behavior: EnumeratesProcesses
PID:2768 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"26⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11827⤵
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"28⤵
- System Location Discovery: System Language Discovery
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11829⤵
- Suspicious behavior: EnumeratesProcesses
PID:776 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"30⤵PID:2416
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11831⤵
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"32⤵PID:2620
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11833⤵
- Suspicious behavior: EnumeratesProcesses
PID:1764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"34⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11835⤵
- Suspicious behavior: EnumeratesProcesses
PID:2996 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"36⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11837⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"38⤵PID:2780
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11839⤵
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"40⤵PID:624
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11841⤵
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"42⤵PID:576
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11843⤵
- Suspicious behavior: EnumeratesProcesses
PID:1300 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"44⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11845⤵
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"46⤵PID:2744
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11847⤵
- Suspicious behavior: EnumeratesProcesses
PID:1012 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"48⤵PID:2360
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11849⤵
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"50⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11851⤵
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"52⤵
- System Location Discovery: System Language Discovery
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11853⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1256 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"54⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11855⤵
- Suspicious behavior: EnumeratesProcesses
PID:784 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"56⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11857⤵
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"58⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11859⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2576 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"60⤵PID:3028
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11861⤵
- Suspicious behavior: EnumeratesProcesses
PID:1632 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"62⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11863⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3016 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"64⤵PID:2044
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11865⤵PID:976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"66⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11867⤵PID:2940
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"68⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11869⤵PID:2976
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"70⤵
- System Location Discovery: System Language Discovery
PID:484 -
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11871⤵PID:2672
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"72⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11873⤵PID:2092
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"74⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11875⤵PID:2224
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"76⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11877⤵PID:1968
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"78⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11879⤵PID:2404
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"80⤵PID:1000
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11881⤵PID:2616
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"82⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11883⤵
- System Location Discovery: System Language Discovery
PID:2192 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"84⤵PID:2956
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11885⤵PID:484
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"86⤵PID:2096
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11887⤵PID:3020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"88⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11889⤵PID:2208
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"90⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11891⤵PID:896
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"92⤵PID:2564
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11893⤵
- System Location Discovery: System Language Discovery
PID:2392 -
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"94⤵PID:2584
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11895⤵PID:2408
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"96⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11897⤵PID:2720
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"98⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes11899⤵PID:536
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"100⤵PID:2128
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118101⤵PID:556
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"102⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118103⤵PID:2552
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"104⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118105⤵PID:3020
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"106⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118107⤵PID:2932
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"108⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118109⤵PID:3068
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"110⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118111⤵PID:2660
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"112⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118113⤵PID:2348
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"114⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118115⤵PID:2768
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"116⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118117⤵PID:1004
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"118⤵PID:1092
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118119⤵PID:2444
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"120⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118.exeC:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118121⤵PID:2820
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\54f18252d65c0a4dcdf360055fd4bf82_JaffaCakes118"122⤵PID:3052
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-