Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-11-2024 13:15
Behavioral task
behavioral1
Sample
859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe
-
Size
65KB
-
MD5
859faeba19d64c6d79585ec77103f541
-
SHA1
fd66f0d783741b99d3b1606877e90c1631530928
-
SHA256
01d131693f0ab79b803e249a760b173abaf1ff5c837623d2e0d7e64882a20c27
-
SHA512
1fcaebbceef41b9560a8cc31d92bdb62c960cc7ee064fd771fc6c3a616d1ba6c580e5ba755c95668f3e89d4086868ff7f0ca30d8f4e3c6a58a58339d2e1fd4a3
-
SSDEEP
768:6TQrdTS2fDx1PTKZ3f9zngwJNNrcjmAffI:BdTvDx1W9z34jmAfQ
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
Processes:
resource yara_rule behavioral2/memory/3404-0-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/files/0x000d000000023bb4-5.dat modiloader_stage2 behavioral2/memory/3404-9-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/784-11-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4628-12-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/784-14-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2300-16-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1804-17-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1172-20-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1432-22-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1600-24-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1856-26-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1860-28-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3196-30-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2292-32-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/652-34-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4508-36-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1668-38-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2140-40-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4900-42-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2804-44-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2008-46-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3528-47-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2008-49-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4836-51-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1188-53-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4208-55-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4500-57-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/548-59-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3488-61-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4924-63-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3336-64-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4924-66-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3980-68-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1608-70-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1420-72-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2860-74-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1032-76-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1088-78-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/736-80-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1944-82-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3404-84-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4224-85-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2128-88-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1736-90-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4788-92-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1188-94-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4208-96-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1804-98-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2592-100-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3488-102-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3456-104-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4924-106-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3332-108-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3940-110-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/5016-112-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/1420-114-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/924-116-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2024-118-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3360-120-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2252-122-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/3320-123-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/2252-125-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 behavioral2/memory/4352-127-0x0000000000400000-0x0000000000412000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Keylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exe859faeba19d64c6d79585ec77103f541_JaffaCakes118.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation Keylogger.exe -
Executes dropped EXE 64 IoCs
Processes:
Keylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exepid Process 4628 Keylogger.exe 784 Keylogger.exe 2300 Keylogger.exe 1804 Keylogger.exe 1172 Keylogger.exe 1432 Keylogger.exe 1600 Keylogger.exe 1856 Keylogger.exe 1860 Keylogger.exe 3196 Keylogger.exe 2292 Keylogger.exe 652 Keylogger.exe 4508 Keylogger.exe 1668 Keylogger.exe 2140 Keylogger.exe 4900 Keylogger.exe 2804 Keylogger.exe 3528 Keylogger.exe 2008 Keylogger.exe 4836 Keylogger.exe 1188 Keylogger.exe 4208 Keylogger.exe 4500 Keylogger.exe 548 Keylogger.exe 3488 Keylogger.exe 3336 Keylogger.exe 4924 Keylogger.exe 3980 Keylogger.exe 1608 Keylogger.exe 1420 Keylogger.exe 2860 Keylogger.exe 1032 Keylogger.exe 1088 Keylogger.exe 736 Keylogger.exe 1944 Keylogger.exe 3404 Keylogger.exe 4224 Keylogger.exe 2128 Keylogger.exe 1736 Keylogger.exe 4788 Keylogger.exe 1188 Keylogger.exe 4208 Keylogger.exe 1804 Keylogger.exe 2592 Keylogger.exe 3488 Keylogger.exe 3456 Keylogger.exe 4924 Keylogger.exe 3332 Keylogger.exe 3940 Keylogger.exe 5016 Keylogger.exe 1420 Keylogger.exe 924 Keylogger.exe 2024 Keylogger.exe 3360 Keylogger.exe 3320 Keylogger.exe 2252 Keylogger.exe 4352 Keylogger.exe 4424 Keylogger.exe 116 Keylogger.exe 3340 Keylogger.exe 880 Keylogger.exe 2476 Keylogger.exe 3380 Keylogger.exe 3892 Keylogger.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
Keylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exe859faeba19d64c6d79585ec77103f541_JaffaCakes118.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Users\\Admin\\AppData\\Local\\Temp\\859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe" 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Ie = "C:\\Windows\\SysWOW64\\Keylogger.exe" Keylogger.exe -
Drops file in System32 directory 64 IoCs
Processes:
Keylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exe859faeba19d64c6d79585ec77103f541_JaffaCakes118.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exedescription ioc Process File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File opened for modification C:\Windows\SysWOW64\Keylogger.exe 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe File created C:\Windows\SysWOW64\Keylogger.exe Keylogger.exe -
Processes:
resource yara_rule behavioral2/memory/3404-0-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/files/0x000d000000023bb4-5.dat upx behavioral2/memory/3404-9-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/784-11-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4628-12-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/784-14-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2300-16-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1804-17-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1172-20-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1432-22-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1600-24-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1856-26-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1860-28-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3196-30-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2292-32-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/652-34-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4508-36-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1668-38-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2140-40-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4900-42-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2804-44-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2008-46-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3528-47-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2008-49-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4836-51-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1188-53-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4208-55-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4500-57-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/548-59-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3488-61-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4924-63-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3336-64-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4924-66-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3980-68-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1608-70-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1420-72-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2860-74-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1032-76-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1088-78-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/736-80-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1944-82-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3404-84-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4224-85-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2128-88-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1736-90-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4788-92-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1188-94-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4208-96-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1804-98-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2592-100-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3488-102-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3456-104-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4924-106-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3332-108-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3940-110-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/5016-112-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/1420-114-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/924-116-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2024-118-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3360-120-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2252-122-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/3320-123-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/2252-125-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral2/memory/4352-127-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Keylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Keylogger.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
859faeba19d64c6d79585ec77103f541_JaffaCakes118.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exeKeylogger.exedescription pid Process procid_target PID 3404 wrote to memory of 4628 3404 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe 87 PID 3404 wrote to memory of 4628 3404 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe 87 PID 3404 wrote to memory of 4628 3404 859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe 87 PID 4628 wrote to memory of 784 4628 Keylogger.exe 88 PID 4628 wrote to memory of 784 4628 Keylogger.exe 88 PID 4628 wrote to memory of 784 4628 Keylogger.exe 88 PID 784 wrote to memory of 2300 784 Keylogger.exe 92 PID 784 wrote to memory of 2300 784 Keylogger.exe 92 PID 784 wrote to memory of 2300 784 Keylogger.exe 92 PID 2300 wrote to memory of 1804 2300 Keylogger.exe 94 PID 2300 wrote to memory of 1804 2300 Keylogger.exe 94 PID 2300 wrote to memory of 1804 2300 Keylogger.exe 94 PID 1804 wrote to memory of 1172 1804 Keylogger.exe 96 PID 1804 wrote to memory of 1172 1804 Keylogger.exe 96 PID 1804 wrote to memory of 1172 1804 Keylogger.exe 96 PID 1172 wrote to memory of 1432 1172 Keylogger.exe 97 PID 1172 wrote to memory of 1432 1172 Keylogger.exe 97 PID 1172 wrote to memory of 1432 1172 Keylogger.exe 97 PID 1432 wrote to memory of 1600 1432 Keylogger.exe 98 PID 1432 wrote to memory of 1600 1432 Keylogger.exe 98 PID 1432 wrote to memory of 1600 1432 Keylogger.exe 98 PID 1600 wrote to memory of 1856 1600 Keylogger.exe 100 PID 1600 wrote to memory of 1856 1600 Keylogger.exe 100 PID 1600 wrote to memory of 1856 1600 Keylogger.exe 100 PID 1856 wrote to memory of 1860 1856 Keylogger.exe 101 PID 1856 wrote to memory of 1860 1856 Keylogger.exe 101 PID 1856 wrote to memory of 1860 1856 Keylogger.exe 101 PID 1860 wrote to memory of 3196 1860 Keylogger.exe 104 PID 1860 wrote to memory of 3196 1860 Keylogger.exe 104 PID 1860 wrote to memory of 3196 1860 Keylogger.exe 104 PID 3196 wrote to memory of 2292 3196 Keylogger.exe 105 PID 3196 wrote to memory of 2292 3196 Keylogger.exe 105 PID 3196 wrote to memory of 2292 3196 Keylogger.exe 105 PID 2292 wrote to memory of 652 2292 Keylogger.exe 106 PID 2292 wrote to memory of 652 2292 Keylogger.exe 106 PID 2292 wrote to memory of 652 2292 Keylogger.exe 106 PID 652 wrote to memory of 4508 652 Keylogger.exe 107 PID 652 wrote to memory of 4508 652 Keylogger.exe 107 PID 652 wrote to memory of 4508 652 Keylogger.exe 107 PID 4508 wrote to memory of 1668 4508 Keylogger.exe 108 PID 4508 wrote to memory of 1668 4508 Keylogger.exe 108 PID 4508 wrote to memory of 1668 4508 Keylogger.exe 108 PID 2140 wrote to memory of 4900 2140 Keylogger.exe 110 PID 2140 wrote to memory of 4900 2140 Keylogger.exe 110 PID 2140 wrote to memory of 4900 2140 Keylogger.exe 110 PID 4900 wrote to memory of 2804 4900 Keylogger.exe 111 PID 4900 wrote to memory of 2804 4900 Keylogger.exe 111 PID 4900 wrote to memory of 2804 4900 Keylogger.exe 111 PID 2804 wrote to memory of 3528 2804 Keylogger.exe 112 PID 2804 wrote to memory of 3528 2804 Keylogger.exe 112 PID 2804 wrote to memory of 3528 2804 Keylogger.exe 112 PID 3528 wrote to memory of 2008 3528 Keylogger.exe 113 PID 3528 wrote to memory of 2008 3528 Keylogger.exe 113 PID 3528 wrote to memory of 2008 3528 Keylogger.exe 113 PID 2008 wrote to memory of 4836 2008 Keylogger.exe 114 PID 2008 wrote to memory of 4836 2008 Keylogger.exe 114 PID 2008 wrote to memory of 4836 2008 Keylogger.exe 114 PID 4836 wrote to memory of 1188 4836 Keylogger.exe 115 PID 4836 wrote to memory of 1188 4836 Keylogger.exe 115 PID 4836 wrote to memory of 1188 4836 Keylogger.exe 115 PID 1188 wrote to memory of 4208 1188 Keylogger.exe 116 PID 1188 wrote to memory of 4208 1188 Keylogger.exe 116 PID 1188 wrote to memory of 4208 1188 Keylogger.exe 116 PID 4208 wrote to memory of 4500 4208 Keylogger.exe 117
Processes
-
C:\Users\Admin\AppData\Local\Temp\859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\859faeba19d64c6d79585ec77103f541_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3404 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"5⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1172 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"7⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1600 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"9⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1856 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"10⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3196 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"12⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"13⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:652 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1668 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"16⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4900 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"19⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"20⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"21⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4836 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"22⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"23⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4208 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"24⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:4500 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"26⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3336 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"28⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"29⤵
- Executes dropped EXE
PID:3980 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"30⤵
- Checks computer location settings
- Executes dropped EXE
PID:1608 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
PID:1420 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"32⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2860 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"33⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1032 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
PID:1088 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
PID:736 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1944 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3404 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"38⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4224 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"39⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2128 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1736 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:4788 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1188 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"43⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4208 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1804 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"45⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2592 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"46⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"47⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3456 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"48⤵
- Checks computer location settings
- Executes dropped EXE
PID:4924 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3332 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3940 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:5016 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"52⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1420 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:924 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"54⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2024 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"56⤵
- Executes dropped EXE
PID:3320 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"57⤵
- Checks computer location settings
- Executes dropped EXE
PID:2252 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
PID:4352 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"59⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"60⤵
- Executes dropped EXE
PID:116 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"61⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3340 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:880 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"63⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2476 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
PID:3380 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"65⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3892 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"66⤵
- System Location Discovery: System Language Discovery
PID:2912 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"67⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:2588 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"68⤵
- Drops file in System32 directory
PID:4540 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"69⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3812 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"70⤵
- Checks computer location settings
- Adds Run key to start application
PID:3040 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"71⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4924 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"72⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4960 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"73⤵
- Adds Run key to start application
PID:4948 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"74⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4604 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"75⤵PID:4520
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"76⤵
- Adds Run key to start application
PID:5092 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"77⤵
- Adds Run key to start application
PID:3172 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"78⤵
- System Location Discovery: System Language Discovery
PID:4664 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"79⤵
- Checks computer location settings
- Adds Run key to start application
PID:2712 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"80⤵PID:1968
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"81⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:736 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"82⤵
- Drops file in System32 directory
PID:4840 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"83⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"84⤵
- Checks computer location settings
- Drops file in System32 directory
PID:5116 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"85⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:116 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"86⤵
- System Location Discovery: System Language Discovery
PID:1752 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"87⤵PID:3404
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"88⤵
- Drops file in System32 directory
PID:2376 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"89⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:880 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"90⤵
- Checks computer location settings
- Adds Run key to start application
PID:3472 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"91⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2444 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"92⤵
- System Location Discovery: System Language Discovery
PID:5060 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"93⤵PID:2744
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"94⤵
- Checks computer location settings
- Adds Run key to start application
PID:2248 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"95⤵
- Checks computer location settings
PID:4400 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"96⤵PID:2588
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"97⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"98⤵
- Drops file in System32 directory
PID:4640 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"99⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:216 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"100⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3812 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"101⤵
- System Location Discovery: System Language Discovery
PID:456 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"102⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"103⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3400 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"104⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"105⤵
- Checks computer location settings
PID:4864 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"106⤵PID:2188
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"107⤵
- Drops file in System32 directory
PID:1632 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"108⤵
- Checks computer location settings
- Drops file in System32 directory
PID:2012 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"109⤵
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"110⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"111⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1728 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"112⤵
- Checks computer location settings
- Drops file in System32 directory
PID:3144 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"113⤵PID:4108
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1444 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"115⤵
- Drops file in System32 directory
PID:3336 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"116⤵PID:3140
-
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"117⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3488 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"118⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3976 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"119⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3592 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"120⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3768 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"121⤵
- Adds Run key to start application
PID:3584 -
C:\Windows\SysWOW64\Keylogger.exe"C:\Windows\system32\Keylogger.exe"122⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-