Analysis
-
max time kernel
37s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 02:44
Behavioral task
behavioral1
Sample
921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe
-
Size
5.8MB
-
MD5
921b0f0750b736d3b0d63d1afaccd765
-
SHA1
e78d7df693b5b5ad92f57d1fe33a4491140c2ba4
-
SHA256
f43c9095f482f80118fdbcded5e96e1367e1415dba13822d092366c3b02d3260
-
SHA512
9afe8e759e9ea7068a6101adcb51896e6abaac2ead4328e26810c79087b0effae587b443bc879b92f958c2cf9502f1c36e651b1141fbe8e377bbd979082703cf
-
SSDEEP
12288:TLn8V3EGAJi/FSCQ6vI5+RUm82fR50vwVc71ap+gbC:TA30GSCQ6vc+k2fTaccl
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
resource yara_rule behavioral1/memory/3044-36-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2056-37-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/3044-46-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/3044-43-0x0000000004200000-0x00000000042C5000-memory.dmp modiloader_stage2 behavioral1/memory/2700-53-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2852-52-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2700-56-0x0000000003E60000-0x0000000003F25000-memory.dmp modiloader_stage2 behavioral1/memory/2700-59-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/3024-62-0x0000000003D00000-0x0000000003DC5000-memory.dmp modiloader_stage2 behavioral1/memory/3024-65-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1604-70-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1988-74-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2316-81-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2316-78-0x0000000003E80000-0x0000000003F45000-memory.dmp modiloader_stage2 behavioral1/memory/2316-76-0x0000000003E80000-0x0000000003F45000-memory.dmp modiloader_stage2 behavioral1/memory/1848-87-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1848-84-0x0000000003E50000-0x0000000003F15000-memory.dmp modiloader_stage2 behavioral1/memory/1616-92-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1116-97-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2956-105-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2956-102-0x0000000003EB0000-0x0000000003F75000-memory.dmp modiloader_stage2 behavioral1/memory/2368-111-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2368-108-0x0000000003CF0000-0x0000000003DB5000-memory.dmp modiloader_stage2 behavioral1/memory/2180-115-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1592-122-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1592-119-0x0000000003CE0000-0x0000000003DA5000-memory.dmp modiloader_stage2 behavioral1/memory/2356-126-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2356-124-0x0000000003CE0000-0x0000000003DA5000-memory.dmp modiloader_stage2 behavioral1/memory/1480-127-0x0000000003CB0000-0x0000000003D75000-memory.dmp modiloader_stage2 behavioral1/memory/1480-129-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1264-131-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2416-134-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2416-132-0x0000000003C00000-0x0000000003CC5000-memory.dmp modiloader_stage2 behavioral1/memory/2272-137-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1468-140-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1468-138-0x0000000003D00000-0x0000000003DC5000-memory.dmp modiloader_stage2 behavioral1/memory/2488-141-0x0000000003BC0000-0x0000000003C85000-memory.dmp modiloader_stage2 behavioral1/memory/2488-143-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2080-145-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2940-147-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2140-151-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2672-153-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2440-155-0x0000000003CE0000-0x0000000003DA5000-memory.dmp modiloader_stage2 behavioral1/memory/2440-158-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2720-161-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2852-166-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2452-171-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1860-174-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1080-177-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2060-178-0x0000000003E40000-0x0000000003F05000-memory.dmp modiloader_stage2 behavioral1/memory/2060-181-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2060-179-0x0000000003E40000-0x0000000003F05000-memory.dmp modiloader_stage2 behavioral1/memory/2028-186-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1708-190-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1528-189-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1708-194-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2860-199-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/1116-202-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2708-205-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/596-218-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2624-219-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/3032-220-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2416-221-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 behavioral1/memory/2936-222-0x0000000000400000-0x00000000004C5000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2056 Program.EXE 2964 Program1.EXE 3044 vssms32.exe 2852 vssms32.exe 2700 vssms32.exe 3024 vssms32.exe 1604 vssms32.exe 1988 vssms32.exe 2316 vssms32.exe 1848 vssms32.exe 1616 vssms32.exe 1116 vssms32.exe 2956 vssms32.exe 2368 vssms32.exe 2180 vssms32.exe 1592 vssms32.exe 2356 vssms32.exe 1480 vssms32.exe 1264 vssms32.exe 2416 vssms32.exe 2272 vssms32.exe 1468 vssms32.exe 2488 vssms32.exe 2080 vssms32.exe 2940 vssms32.exe 2140 vssms32.exe 2672 vssms32.exe 2440 vssms32.exe 2720 vssms32.exe 2852 vssms32.exe 2452 vssms32.exe 1860 vssms32.exe 1080 vssms32.exe 2060 vssms32.exe 2028 vssms32.exe 1528 vssms32.exe 1708 vssms32.exe 2860 vssms32.exe 1116 vssms32.exe 2708 vssms32.exe 3060 vssms32.exe 1720 vssms32.exe 1484 vssms32.exe 888 vssms32.exe 596 vssms32.exe 2624 vssms32.exe 3032 vssms32.exe 2416 vssms32.exe 2936 vssms32.exe 2252 vssms32.exe 1516 vssms32.exe 2436 vssms32.exe 580 vssms32.exe 2996 vssms32.exe 2744 vssms32.exe 2728 vssms32.exe 2816 vssms32.exe 2524 vssms32.exe 2600 vssms32.exe 2852 vssms32.exe 1368 vssms32.exe 1204 vssms32.exe 1224 vssms32.exe 1656 vssms32.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Program.EXE -
Loads dropped DLL 64 IoCs
pid Process 2056 Program.EXE 2056 Program.EXE 3044 vssms32.exe 3044 vssms32.exe 2852 vssms32.exe 2852 vssms32.exe 2700 vssms32.exe 2700 vssms32.exe 3024 vssms32.exe 3024 vssms32.exe 1604 vssms32.exe 1604 vssms32.exe 1988 vssms32.exe 1988 vssms32.exe 2316 vssms32.exe 2316 vssms32.exe 1848 vssms32.exe 1848 vssms32.exe 1616 vssms32.exe 1616 vssms32.exe 1116 vssms32.exe 1116 vssms32.exe 2956 vssms32.exe 2956 vssms32.exe 2368 vssms32.exe 2368 vssms32.exe 2180 vssms32.exe 2180 vssms32.exe 1592 vssms32.exe 1592 vssms32.exe 2356 vssms32.exe 2356 vssms32.exe 1480 vssms32.exe 1480 vssms32.exe 1264 vssms32.exe 1264 vssms32.exe 2416 vssms32.exe 2416 vssms32.exe 2272 vssms32.exe 2272 vssms32.exe 1468 vssms32.exe 1468 vssms32.exe 2488 vssms32.exe 2488 vssms32.exe 2080 vssms32.exe 2080 vssms32.exe 2940 vssms32.exe 2940 vssms32.exe 2140 vssms32.exe 2140 vssms32.exe 2672 vssms32.exe 2672 vssms32.exe 2440 vssms32.exe 2440 vssms32.exe 2720 vssms32.exe 2720 vssms32.exe 2852 vssms32.exe 2852 vssms32.exe 2452 vssms32.exe 2452 vssms32.exe 1860 vssms32.exe 1860 vssms32.exe 1080 vssms32.exe 1080 vssms32.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe -
resource yara_rule behavioral1/memory/776-0-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/files/0x000b0000000120dc-9.dat upx behavioral1/memory/2056-12-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/776-7-0x0000000002A40000-0x0000000002B05000-memory.dmp upx behavioral1/memory/776-20-0x0000000000400000-0x0000000000410000-memory.dmp upx behavioral1/memory/3044-36-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2056-37-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/3044-46-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2852-44-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2700-53-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2852-52-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2852-49-0x0000000003E40000-0x0000000003F05000-memory.dmp upx behavioral1/memory/2700-56-0x0000000003E60000-0x0000000003F25000-memory.dmp upx behavioral1/memory/2700-59-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1604-64-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/3024-65-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1604-70-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1988-74-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2316-81-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1848-87-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1616-92-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1116-97-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2956-105-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2368-103-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2368-111-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2180-115-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1592-122-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2356-126-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1480-129-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1264-131-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2416-134-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2272-137-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1468-140-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1468-138-0x0000000003D00000-0x0000000003DC5000-memory.dmp upx behavioral1/memory/2488-143-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2080-145-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2940-147-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2140-151-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2672-153-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2440-154-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2440-158-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2852-162-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2720-161-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2852-166-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2452-171-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1860-174-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1080-177-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2028-182-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2060-181-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2028-186-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1528-185-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1708-190-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1528-189-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1708-191-0x0000000003DF0000-0x0000000003EB5000-memory.dmp upx behavioral1/memory/1708-194-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2860-199-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1116-197-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/1116-202-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2708-205-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/596-218-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2624-219-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/3032-220-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2416-221-0x0000000000400000-0x00000000004C5000-memory.dmp upx behavioral1/memory/2936-222-0x0000000000400000-0x00000000004C5000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Program.EXE 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe File created C:\Windows\Program1.EXE 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Program.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2964 Program1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 776 wrote to memory of 2056 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 30 PID 776 wrote to memory of 2056 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 30 PID 776 wrote to memory of 2056 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 30 PID 776 wrote to memory of 2056 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 30 PID 776 wrote to memory of 2964 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 31 PID 776 wrote to memory of 2964 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 31 PID 776 wrote to memory of 2964 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 31 PID 776 wrote to memory of 2964 776 921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe 31 PID 2056 wrote to memory of 3044 2056 Program.EXE 32 PID 2056 wrote to memory of 3044 2056 Program.EXE 32 PID 2056 wrote to memory of 3044 2056 Program.EXE 32 PID 2056 wrote to memory of 3044 2056 Program.EXE 32 PID 3044 wrote to memory of 2852 3044 vssms32.exe 60 PID 3044 wrote to memory of 2852 3044 vssms32.exe 60 PID 3044 wrote to memory of 2852 3044 vssms32.exe 60 PID 3044 wrote to memory of 2852 3044 vssms32.exe 60 PID 2852 wrote to memory of 2700 2852 vssms32.exe 34 PID 2852 wrote to memory of 2700 2852 vssms32.exe 34 PID 2852 wrote to memory of 2700 2852 vssms32.exe 34 PID 2852 wrote to memory of 2700 2852 vssms32.exe 34 PID 2700 wrote to memory of 3024 2700 vssms32.exe 35 PID 2700 wrote to memory of 3024 2700 vssms32.exe 35 PID 2700 wrote to memory of 3024 2700 vssms32.exe 35 PID 2700 wrote to memory of 3024 2700 vssms32.exe 35 PID 3024 wrote to memory of 1604 3024 vssms32.exe 36 PID 3024 wrote to memory of 1604 3024 vssms32.exe 36 PID 3024 wrote to memory of 1604 3024 vssms32.exe 36 PID 3024 wrote to memory of 1604 3024 vssms32.exe 36 PID 1604 wrote to memory of 1988 1604 vssms32.exe 37 PID 1604 wrote to memory of 1988 1604 vssms32.exe 37 PID 1604 wrote to memory of 1988 1604 vssms32.exe 37 PID 1604 wrote to memory of 1988 1604 vssms32.exe 37 PID 1988 wrote to memory of 2316 1988 vssms32.exe 38 PID 1988 wrote to memory of 2316 1988 vssms32.exe 38 PID 1988 wrote to memory of 2316 1988 vssms32.exe 38 PID 1988 wrote to memory of 2316 1988 vssms32.exe 38 PID 2316 wrote to memory of 1848 2316 vssms32.exe 39 PID 2316 wrote to memory of 1848 2316 vssms32.exe 39 PID 2316 wrote to memory of 1848 2316 vssms32.exe 39 PID 2316 wrote to memory of 1848 2316 vssms32.exe 39 PID 1848 wrote to memory of 1616 1848 vssms32.exe 40 PID 1848 wrote to memory of 1616 1848 vssms32.exe 40 PID 1848 wrote to memory of 1616 1848 vssms32.exe 40 PID 1848 wrote to memory of 1616 1848 vssms32.exe 40 PID 1616 wrote to memory of 1116 1616 vssms32.exe 69 PID 1616 wrote to memory of 1116 1616 vssms32.exe 69 PID 1616 wrote to memory of 1116 1616 vssms32.exe 69 PID 1616 wrote to memory of 1116 1616 vssms32.exe 69 PID 1116 wrote to memory of 2956 1116 vssms32.exe 42 PID 1116 wrote to memory of 2956 1116 vssms32.exe 42 PID 1116 wrote to memory of 2956 1116 vssms32.exe 42 PID 1116 wrote to memory of 2956 1116 vssms32.exe 42 PID 2956 wrote to memory of 2368 2956 vssms32.exe 43 PID 2956 wrote to memory of 2368 2956 vssms32.exe 43 PID 2956 wrote to memory of 2368 2956 vssms32.exe 43 PID 2956 wrote to memory of 2368 2956 vssms32.exe 43 PID 2368 wrote to memory of 2180 2368 vssms32.exe 44 PID 2368 wrote to memory of 2180 2368 vssms32.exe 44 PID 2368 wrote to memory of 2180 2368 vssms32.exe 44 PID 2368 wrote to memory of 2180 2368 vssms32.exe 44 PID 2180 wrote to memory of 1592 2180 vssms32.exe 45 PID 2180 wrote to memory of 1592 2180 vssms32.exe 45 PID 2180 wrote to memory of 1592 2180 vssms32.exe 45 PID 2180 wrote to memory of 1592 2180 vssms32.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\921b0f0750b736d3b0d63d1afaccd765_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Windows\Program.EXE"C:\Windows\Program.EXE"2⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1592 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1480 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1468 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2488 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2140 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:2672 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2440 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2720 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2852 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:1860 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
PID:1080 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"34⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2060 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"35⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2028 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"36⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1528 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"38⤵
- Executes dropped EXE
PID:2860 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"39⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1116 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"40⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2708 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3060 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1720 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"44⤵
- Executes dropped EXE
PID:888 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"45⤵
- Executes dropped EXE
PID:596 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2624 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"47⤵
- Executes dropped EXE
PID:3032 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"48⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2416 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"49⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2936 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"52⤵
- Executes dropped EXE
PID:2436 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"53⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:580 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"54⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2996 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"55⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2744 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"56⤵
- Executes dropped EXE
PID:2728 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"57⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2816 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"58⤵
- Executes dropped EXE
PID:2524 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"59⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2600 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"60⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2852 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"61⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1368 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1204 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1224 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"64⤵
- Executes dropped EXE
PID:1656 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"65⤵PID:2060
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"66⤵
- Adds Run key to start application
PID:1676 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"67⤵
- Adds Run key to start application
PID:556 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"68⤵PID:2856
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"69⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"70⤵
- Adds Run key to start application
PID:2828 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"71⤵
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"72⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1100 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"73⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2512 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"74⤵PID:1684
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"75⤵
- System Location Discovery: System Language Discovery
PID:1160 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"76⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"77⤵PID:888
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"78⤵
- Drops file in System32 directory
PID:2380 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"79⤵
- Adds Run key to start application
PID:1504 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"80⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"81⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2416 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"82⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1568 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"83⤵
- System Location Discovery: System Language Discovery
PID:2252 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"84⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3012 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"85⤵PID:1660
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2732 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"87⤵
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"88⤵
- Adds Run key to start application
PID:2616 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"89⤵
- System Location Discovery: System Language Discovery
PID:2556 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"90⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2528 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"91⤵PID:2456
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"92⤵
- Drops file in System32 directory
PID:2452 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"93⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:340 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"94⤵
- Drops file in System32 directory
PID:640 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"95⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2344 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"96⤵PID:800
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2316 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"98⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2424 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"99⤵PID:1964
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"100⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"101⤵PID:2856
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1708 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"103⤵
- Adds Run key to start application
PID:2588 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"104⤵PID:1116
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"105⤵
- Adds Run key to start application
PID:2924 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"106⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2396 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"107⤵
- Adds Run key to start application
PID:2336 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"108⤵
- Drops file in System32 directory
PID:2704 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"109⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"110⤵PID:1588
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"111⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1704 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"112⤵
- Drops file in System32 directory
PID:352 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"113⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:568 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"114⤵
- Drops file in System32 directory
PID:280 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"115⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"116⤵
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"117⤵
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"118⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"119⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"120⤵
- Adds Run key to start application
PID:2664 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"121⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"122⤵
- Drops file in System32 directory
PID:2532
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-