Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03-11-2024 15:50
Behavioral task
behavioral1
Sample
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe
-
Size
40KB
-
MD5
8c43ba596e217e1ec2770f189065c394
-
SHA1
676510b07474fe48c7d9883a4307000556401b28
-
SHA256
b5c65b9de6adfb705887dc2346f41e649fcf977fdac33ce0afca327d1105daab
-
SHA512
a2a2ae7297d85c3cfd2322ae7e3182b1d484a68fcc27495483ff473b2b4c608cb78b3ed4234e60dd9112ca5d59f3b05ec39e401d47d8ae7d34e510fbb0bcd8cc
-
SSDEEP
768:NE9hYh7Nq2Ozhiow2Gkm6Bcn/9fzNBwIldwbzosd:Nu2hzOlw2GkmXnBBldw/ok
Malware Config
Signatures
-
Detect XtremeRAT payload 26 IoCs
Processes:
resource yara_rule behavioral1/memory/2572-7-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat C:\Windows\SysWOW64\InstallDir\Server.exe family_xtremerat behavioral1/memory/2072-47-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2652-55-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2892-95-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2004-104-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/840-144-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2576-152-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/832-190-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2300-199-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/1240-239-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2624-249-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/3032-288-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2432-298-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/1660-338-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/1720-348-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/840-386-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2228-396-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2036-436-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/476-444-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/1504-482-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/1092-491-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/532-531-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2288-539-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/1864-578-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat behavioral1/memory/2076-587-0x0000000000C80000-0x0000000000C92000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
Processes:
Server.exe8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{89B4C1CD-B018-4511-B0A1-5476DBF70820} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4340} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{2C7339CF-2B09-4501-B3F3-F3508C9228ED} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\>{60B49E34-C7CC-11D0-8953-00A0C90347FF} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{6BF52A52-394A-11d3-B153-00C04F79FAA6} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{89820200-ECBD-11cf-8B85-00AA005B4383} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{44BBA840-CC51-11CF-AAFA-00AA00B6015C} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Active Setup\Installed Components\{8A69D345-D564-463c-AFF1-A69D9E530F96} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Windows\\system32\\InstallDir\\Server.exe restbst" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6} Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{56OS1J3W-0C5D-4CS6-5LV8-J6A2D74R3SS6}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe restbst" Server.exe -
Manipulates Digital Signatures 1 TTPs 25 IoCs
Attackers can apply techniques such as changing the registry keys of authenticode & Cryptography to obtain their binary as valid.
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPublisher\CTLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPeople 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\trust\CRLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\trust\Certificates 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPublisher\CRLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPublisher\Certificates 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPublisher 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\trust\Certificates 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\CRLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\trust 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\trust\CRLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\trust\CTLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\CTLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPublisher\Certificates 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Policies\Microsoft\SystemCertificates\TrustedPeople 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\trust\CTLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\SystemCertificates\trust 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe -
Executes dropped EXE 28 IoCs
Processes:
Server.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exepid process 2892 Server.exe 840 Server.exe 832 Server.exe 1240 Server.exe 3032 Server.exe 1660 Server.exe 840 Server.exe 2036 Server.exe 1504 Server.exe 532 Server.exe 1864 Server.exe 332 Server.exe 1236 Server.exe 1980 Server.exe 964 Server.exe 2296 Server.exe 3048 Server.exe 316 Server.exe 1272 Server.exe 1980 Server.exe 1636 Server.exe 2964 Server.exe 3112 Server.exe 3420 Server.exe 3728 Server.exe 4052 Server.exe 3400 Server.exe 3496 Server.exe -
Loads dropped DLL 43 IoCs
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exepid process 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe 2892 Server.exe 2892 Server.exe 840 Server.exe 840 Server.exe 832 Server.exe 1240 Server.exe 1240 Server.exe 3032 Server.exe 1660 Server.exe 1660 Server.exe 840 Server.exe 2036 Server.exe 2036 Server.exe 1504 Server.exe 532 Server.exe 532 Server.exe 1864 Server.exe 332 Server.exe 332 Server.exe 1236 Server.exe 1980 Server.exe 1980 Server.exe 964 Server.exe 2296 Server.exe 2296 Server.exe 3048 Server.exe 316 Server.exe 316 Server.exe 1272 Server.exe 1980 Server.exe 1980 Server.exe 1636 Server.exe 2964 Server.exe 2964 Server.exe 3112 Server.exe 3420 Server.exe 3420 Server.exe 3728 Server.exe 4052 Server.exe 4052 Server.exe 3400 Server.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
Server.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exe8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Users\\Admin\\AppData\\Roaming\\InstallDir\\Server.exe" Server.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\system32\\InstallDir\\Server.exe" 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run Server.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\system32\\InstallDir\\Server.exe" Server.exe -
Drops file in System32 directory 44 IoCs
Processes:
Server.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exe8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File created C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe File opened for modification C:\Windows\SysWOW64\InstallDir\Server.exe Server.exe -
Drops file in Program Files directory 64 IoCs
Processes:
Server.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exe8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exedescription ioc process File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.DAT Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE.HKCUZoneInfo\IE.HKCUZoneInfo.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe File opened for modification C:\Program Files (x86)\Uninstall Information\IE40.UserAgent\IE40.UserAgent.INI Server.exe -
Drops file in Windows directory 28 IoCs
Processes:
Server.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exe8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe File opened for modification C:\Windows\INF\setupapi.app.log Server.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 29 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Server.exe -
Modifies Control Panel 64 IoCs
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\2\Sizes 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\4\Sizes\0 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Mouse 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\2\Sizes\0 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\PowerCfg\PowerPolicies\2 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International\Geo 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\WindowMetrics 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Accessibility 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys\00000202 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys\00000071 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Infrared\Global 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\PowerCfg 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys\00000104 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys\00000012 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Desktop\MuiCached 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\1\Sizes 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\0\Sizes 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Accessibility\Keyboard Response 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Cursors 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\Schemes 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\3\Sizes 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Accessibility\On 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Infrared 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\PowerCfg\PowerPolicies\0 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\PowerCfg\GlobalPowerPolicy 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\International 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\PowerCfg\PowerPolicies 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes\1 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Accessibility\TimeOut 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Appearance\New Schemes 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Accessibility\Keyboard Preference 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Control Panel\Input Method\Hot Keys\00000072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe -
Modifies Internet Explorer Protected Mode 1 TTPs 28 IoCs
Processes:
Server.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exe8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe Set value (int) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Zones\1\2500 = "3" Server.exe -
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchUrl 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Default Feeds\{E678D0DA-4DA2-433D-B772-49AA924E45DC} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\c4de6211_0 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\39 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\36 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\27 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\URLSearchHooks 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Default Feeds 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LinksBar 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IETld 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\35 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\30 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\14 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\IntelliForms\Storage2 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\TypedURLs 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\9 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\21 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\34 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\33 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\12 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\18 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Desktop\General 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Suggested Sites 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\PageSetup 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\28 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\31 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\15 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Document Windows 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\7 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\38 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Settings 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\MINIE 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\313f0d05_0 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\6 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\22 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\20 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\10 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Zoom 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\LowRegistry\Audio\PolicyConfig\PropertyStore\313f0d05_0\{219ED5A0-9CBF-4F3A-B927-37C9E5C5F14F} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\3 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\5 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\25 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\19 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Services 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SearchScopes\{0633EE93-D776-472f-A0FF-E1416B8B2E3A} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Recovery 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\8 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\SQM 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Main\Default Feeds\{7E764830-5654-4F22-B54A-EB90444C14C3} 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\International\Scripts\29 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Internet Explorer\Desktop 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe -
Modifies registry class 61 IoCs
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription ioc process Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.rar\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.gz 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bz2 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\SyncMgr 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tgz\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\JavaPlugin.10802\CLSID 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.rar\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bzip2\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bzip2 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bz2\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\MuiCache 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tar\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.gz\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tgz\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bzip2\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.7z\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\FirefoxPDF-308046B0AF4A39CB 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\FirefoxPDF-308046B0AF4A39CB\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\FirefoxPDF-308046B0AF4A39CB\DefaultIcon 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.rar 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tar 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tar\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tgz 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tar\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.7z\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion\TrayNotify 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\FirefoxPDF-308046B0AF4A39CB\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.tgz\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\FirefoxPDF-308046B0AF4A39CB\shell\open\ddeexec 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bzip2\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bz2\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.7z\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows\CurrentVersion 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\Software\Microsoft\Windows 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.gz\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.bz2\shell\open 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings\MuiCache Server.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\Local Settings 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.rar\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.gz\shell\open\command 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\JavaPlugin.10802 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\FirefoxPDF-308046B0AF4A39CB\shell 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Key deleted \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\7-Zip.7z 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exeServer.exedescription pid process Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 2892 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 832 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 1240 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 3032 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 1660 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 840 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 2036 Server.exe Token: SeRestorePrivilege 1504 Server.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exeServer.exedescription pid process target process PID 2072 wrote to memory of 2572 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe svchost.exe PID 2072 wrote to memory of 2572 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe svchost.exe PID 2072 wrote to memory of 2572 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe svchost.exe PID 2072 wrote to memory of 2572 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe svchost.exe PID 2072 wrote to memory of 2572 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe svchost.exe PID 2072 wrote to memory of 2320 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2320 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2320 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2320 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2320 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2312 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2312 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2312 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2312 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2312 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2548 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2548 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2548 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2548 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2548 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 1492 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 1492 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 1492 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 1492 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 1492 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2896 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2896 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2896 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2896 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2896 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 280 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 280 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 280 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 280 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 280 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2336 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2336 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2336 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2336 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2336 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2468 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2468 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2468 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2468 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe iexplore.exe PID 2072 wrote to memory of 2892 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Server.exe PID 2072 wrote to memory of 2892 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Server.exe PID 2072 wrote to memory of 2892 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Server.exe PID 2072 wrote to memory of 2892 2072 8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe Server.exe PID 2892 wrote to memory of 2652 2892 Server.exe svchost.exe PID 2892 wrote to memory of 2652 2892 Server.exe svchost.exe PID 2892 wrote to memory of 2652 2892 Server.exe svchost.exe PID 2892 wrote to memory of 2652 2892 Server.exe svchost.exe PID 2892 wrote to memory of 2652 2892 Server.exe svchost.exe PID 2892 wrote to memory of 2628 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2628 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2628 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2628 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2628 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2672 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2672 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2672 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2672 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2672 2892 Server.exe iexplore.exe PID 2892 wrote to memory of 2716 2892 Server.exe iexplore.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\8c43ba596e217e1ec2770f189065c394_JaffaCakes118.exe"1⤵
- Boot or Logon Autostart Execution: Active Setup
- Manipulates Digital Signatures
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies Internet Explorer settings
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:2572
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2312
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2548
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:1492
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2896
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"2⤵PID:2468
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵PID:2652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2628
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1804
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2156
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2224
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2308
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\svchost.exesvchost.exe4⤵PID:2004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2920
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1752
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:1336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2924
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2932
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2988
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:832 -
C:\Windows\SysWOW64\svchost.exesvchost.exe5⤵PID:2576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1356
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1620
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2120
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:1808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2492
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Suspicious use of AdjustPrivilegeToken
PID:1240 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵PID:2300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2244
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2364
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:296
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:288
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1664
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2472
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:3032 -
C:\Windows\SysWOW64\svchost.exesvchost.exe7⤵PID:2624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:3068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2332
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2952
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2732
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2616
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Suspicious use of AdjustPrivilegeToken
PID:1660 -
C:\Windows\SysWOW64\svchost.exesvchost.exe8⤵PID:2432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:492
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2116
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2160
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1792
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2540
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:840 -
C:\Windows\SysWOW64\svchost.exesvchost.exe9⤵PID:1720
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1544
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:656
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:760
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2424
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2292
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:3052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:628
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Suspicious use of AdjustPrivilegeToken
PID:2036 -
C:\Windows\SysWOW64\svchost.exesvchost.exe10⤵PID:2228
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2840
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1512
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2524
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
PID:1504 -
C:\Windows\SysWOW64\svchost.exesvchost.exe11⤵PID:476
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:2808
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:664
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:2652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:2704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:2660
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:2304
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:3032
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1932
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:532 -
C:\Windows\SysWOW64\svchost.exesvchost.exe12⤵PID:1092
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:2936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:2684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:3040
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:1844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:1560
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:1548
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:688
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:2440
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:1864 -
C:\Windows\SysWOW64\svchost.exesvchost.exe13⤵PID:2288
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2536
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2828
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2804
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2812
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2888
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2796
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2944
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"13⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
PID:332 -
C:\Windows\SysWOW64\svchost.exesvchost.exe14⤵PID:2076
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2984
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:1988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2128
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:600
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:1432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:1960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2356
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"14⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:1236 -
C:\Windows\SysWOW64\svchost.exesvchost.exe15⤵PID:1588
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:1596
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2136
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:1576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2368
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"15⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:1980 -
C:\Windows\SysWOW64\svchost.exesvchost.exe16⤵PID:2280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:2824
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1232
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:3004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:3000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1552
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:2216
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1816
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"16⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:964 -
C:\Windows\SysWOW64\svchost.exesvchost.exe17⤵PID:2204
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1072
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:2432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:2724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:2712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:568
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"17⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:2296 -
C:\Windows\SysWOW64\svchost.exesvchost.exe18⤵PID:2788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2416
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:912
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:1268
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:692
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:1504
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2600
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:1956
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2664
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"18⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:3048 -
C:\Windows\SysWOW64\svchost.exesvchost.exe19⤵PID:2520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2228
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:292
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:1744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2860
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:1584
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2212
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:1488
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2076
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"19⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:316 -
C:\Windows\SysWOW64\svchost.exesvchost.exe20⤵PID:1980
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:332
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2184
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2856
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"20⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:1272 -
C:\Windows\SysWOW64\svchost.exesvchost.exe21⤵PID:1652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:1688
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:1656
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2096
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2876
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:1856
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:1140
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"21⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:1980 -
C:\Windows\SysWOW64\svchost.exesvchost.exe22⤵PID:768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:1716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:1640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2956
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:680
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:1776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2544
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:832
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"22⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\svchost.exesvchost.exe23⤵PID:2736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1272
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1392
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1588
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:2512
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:2520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1680
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"23⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:2964 -
C:\Windows\SysWOW64\svchost.exesvchost.exe24⤵PID:1668
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2176
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:1636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:856
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2288
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2072
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2112
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"24⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:3112 -
C:\Windows\SysWOW64\svchost.exesvchost.exe25⤵PID:3172
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3196
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3212
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3220
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3232
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3240
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3252
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3260
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3272
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"25⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:3420 -
C:\Windows\SysWOW64\svchost.exesvchost.exe26⤵PID:3480
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3504
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3528
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3548
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3560
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3568
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:3580
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"26⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:3728 -
C:\Windows\SysWOW64\svchost.exesvchost.exe27⤵PID:3788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3820
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3848
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3856
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3868
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3880
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3900
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"27⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
PID:4052 -
C:\Windows\SysWOW64\svchost.exesvchost.exe28⤵PID:3076
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3104
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3124
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:2168
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:2360
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:2100
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:2056
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3156
-
-
C:\Windows\SysWOW64\InstallDir\Server.exe"C:\Windows\system32\InstallDir\Server.exe"28⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Modifies Control Panel
- Modifies Internet Explorer Protected Mode
- Modifies registry class
PID:3400 -
C:\Windows\SysWOW64\svchost.exesvchost.exe29⤵PID:3116
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3456
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3476
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3492
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3516
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:1964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:2028
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3612
-
-
C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"C:\Users\Admin\AppData\Roaming\InstallDir\Server.exe"29⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3496 -
C:\Windows\SysWOW64\svchost.exesvchost.exe30⤵PID:3784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3888
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3928
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3940
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3948
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3960
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Defense Evasion
Modify Registry
4Subvert Trust Controls
1SIP and Trust Provider Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD573d1da91a59b3cb4715e28bfc6cb95e4
SHA145fbd7d45b5a805cfd708bbde0092455de2b657f
SHA256d23dd97fb2b812af621146a912d2cdaccff29e836ba33266d1f81e083ad1c39d
SHA5121cc73b0fb0c8f3f53e039071dfc15e8b5f4e4872f66f1dfb4a37532f48417dfa227564f024ebf472635690f2c284ff0c53c14fe4b9854f0b660be854afa350dd
-
Filesize
1KB
MD526d236424d30e9999b59d0fb7398d100
SHA1e31bbdffe7637d050819088a46f6eb20368cf90c
SHA2561fc92235b9ee7ebde9b17e9f358be87097e0e73f3b8bf48b10645d6527607e3b
SHA51256cd591f2eb19c6045d42a46eecd56ffb1a22ee7a225a7a9d338e86741635aaed820b8e792fd548bfe9a15392417f14fbaa474b821259ff38a4dab01c73509f7
-
Filesize
40KB
MD58c43ba596e217e1ec2770f189065c394
SHA1676510b07474fe48c7d9883a4307000556401b28
SHA256b5c65b9de6adfb705887dc2346f41e649fcf977fdac33ce0afca327d1105daab
SHA512a2a2ae7297d85c3cfd2322ae7e3182b1d484a68fcc27495483ff473b2b4c608cb78b3ed4234e60dd9112ca5d59f3b05ec39e401d47d8ae7d34e510fbb0bcd8cc
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e