Analysis
-
max time kernel
120s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
25-11-2024 02:41
Behavioral task
behavioral1
Sample
98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe
-
Size
1.2MB
-
MD5
98b9cdb8538396beac04570b859cbc71
-
SHA1
0d56b67caa70540818d64cf6c5081b78a162f4a6
-
SHA256
e1a713cb4fb0925ad84cb8481dc9abd7c52af39a2de1178ee03ee8ee37b02f4a
-
SHA512
787d9cb901af9f6f06dc96fdd20f6183927b24e798068bcc7cb8cab43b4095dd93dce4ca96d279b451b5e7d670a65c7144e4620d3d13f2132eebbd4e09beb975
-
SSDEEP
24576:zUuQmFQK1EA30nV/n+QmFQK1Mg3QmFQK1Hg3QmFQK1+g3QmFQK1xhg3QmFQK1m:zUuQmFQK1EJn5n+QmFQK1Mg3QmFQK1H2
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
Processes:
resource yara_rule behavioral2/memory/2912-66-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3548-68-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/408-70-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4720-72-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3548-74-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4720-77-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1508-80-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/264-83-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3988-85-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3188-88-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4344-93-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4480-97-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2260-100-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/916-102-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3668-105-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1864-108-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4936-111-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1472-114-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1536-118-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1820-121-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4044-125-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1792-128-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4028-131-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2704-133-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1508-136-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4192-140-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2712-142-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3280-144-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2988-147-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2244-150-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/444-153-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3836-157-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/316-159-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2420-162-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2616-165-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2932-167-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1520-168-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4412-169-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3340-171-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1472-172-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1536-173-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/464-175-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2360-177-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4992-179-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/232-181-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4608-182-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1692-184-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4192-185-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2268-186-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4192-188-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2884-190-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3912-192-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/992-194-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2244-196-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/1844-198-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/5024-200-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3816-202-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/5004-203-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4340-205-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/3356-206-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2968-208-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/2280-209-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4160-210-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 behavioral2/memory/4760-212-0x0000000000400000-0x00000000004F3000-memory.dmp modiloader_stage2 -
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
explore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeProgram.EXEexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Program.EXE Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation explore.exe -
Executes dropped EXE 64 IoCs
Processes:
Program.EXEProgram1.EXEexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exepid Process 2912 Program.EXE 4920 Program1.EXE 408 explore.exe 3548 explore.exe 4720 explore.exe 1508 explore.exe 264 explore.exe 3988 explore.exe 3188 explore.exe 4344 explore.exe 4480 explore.exe 2260 explore.exe 916 explore.exe 3668 explore.exe 1864 explore.exe 4936 explore.exe 1472 explore.exe 1536 explore.exe 1820 explore.exe 4044 explore.exe 1792 explore.exe 4028 explore.exe 2704 explore.exe 1508 explore.exe 4192 explore.exe 2712 explore.exe 3280 explore.exe 2988 explore.exe 2244 explore.exe 444 explore.exe 3836 explore.exe 316 explore.exe 2420 explore.exe 2616 explore.exe 2932 explore.exe 1520 explore.exe 4412 explore.exe 3340 explore.exe 1472 explore.exe 1536 explore.exe 464 explore.exe 2360 explore.exe 4992 explore.exe 232 explore.exe 4608 explore.exe 1692 explore.exe 2268 explore.exe 4192 explore.exe 2884 explore.exe 3912 explore.exe 992 explore.exe 2244 explore.exe 1844 explore.exe 5024 explore.exe 3816 explore.exe 5004 explore.exe 4340 explore.exe 3356 explore.exe 2968 explore.exe 2280 explore.exe 4160 explore.exe 4760 explore.exe 464 explore.exe 2912 explore.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 6 IoCs
Processes:
Program.EXEdescription ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\UserManager Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\SerCx2.sys Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\iai2c.sys Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\CBDHSvc Program.EXE -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
explore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\explorer = "C:\\Windows\\system32\\explore.exe" explore.exe -
Drops file in System32 directory 64 IoCs
Processes:
explore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe -
Processes:
resource yara_rule behavioral2/memory/1644-0-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/files/0x000c000000023b17-5.dat upx behavioral2/memory/2912-18-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1644-21-0x0000000000400000-0x000000000043F000-memory.dmp upx behavioral2/memory/408-64-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2912-66-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3548-68-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/408-70-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4720-72-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3548-74-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4720-77-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1508-80-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/264-83-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3988-85-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3188-88-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4344-93-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4480-97-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2260-100-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/916-102-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3668-105-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1864-108-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4936-111-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1472-114-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1820-116-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1536-118-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1820-121-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4044-125-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1792-128-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4028-131-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2704-133-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1508-136-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4192-140-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2712-142-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3280-144-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2988-147-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2244-150-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/444-153-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3836-152-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3836-157-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/316-159-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2420-162-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2616-165-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2932-167-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1520-168-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4412-169-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3340-171-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1472-172-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1536-173-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/464-175-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2360-177-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4992-179-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/232-181-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4608-182-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1692-184-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4192-185-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2268-186-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/4192-188-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2884-190-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3912-192-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/992-194-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/2244-196-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/1844-198-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/5024-200-0x0000000000400000-0x00000000004F3000-memory.dmp upx behavioral2/memory/3816-202-0x0000000000400000-0x00000000004F3000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
Processes:
98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exedescription ioc Process File created C:\Windows\Program.EXE 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe File created C:\Windows\Program1.EXE 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
explore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exe98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe -
Modifies registry class 64 IoCs
Processes:
explore.exeexplore.exeProgram1.EXEexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeProgram.EXEexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff Program1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\1\Shell\SniffedFolderType = "Documents" Program1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Set value (int) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0\NodeSlot = "1" Program1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = 00000000ffffffff Program1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU Program1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ Program.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Set value (data) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\0\0 = 14002e80922b16d365937a46956b92703aca08af0000 Program1.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ explore.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
Program1.EXEpid Process 4920 Program1.EXE 4920 Program1.EXE 4920 Program1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exeProgram.EXEexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exeexplore.exedescription pid Process procid_target PID 1644 wrote to memory of 2912 1644 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe 83 PID 1644 wrote to memory of 2912 1644 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe 83 PID 1644 wrote to memory of 2912 1644 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe 83 PID 1644 wrote to memory of 4920 1644 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe 84 PID 1644 wrote to memory of 4920 1644 98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe 84 PID 2912 wrote to memory of 408 2912 Program.EXE 85 PID 2912 wrote to memory of 408 2912 Program.EXE 85 PID 2912 wrote to memory of 408 2912 Program.EXE 85 PID 408 wrote to memory of 3548 408 explore.exe 86 PID 408 wrote to memory of 3548 408 explore.exe 86 PID 408 wrote to memory of 3548 408 explore.exe 86 PID 3548 wrote to memory of 4720 3548 explore.exe 87 PID 3548 wrote to memory of 4720 3548 explore.exe 87 PID 3548 wrote to memory of 4720 3548 explore.exe 87 PID 4720 wrote to memory of 1508 4720 explore.exe 88 PID 4720 wrote to memory of 1508 4720 explore.exe 88 PID 4720 wrote to memory of 1508 4720 explore.exe 88 PID 1508 wrote to memory of 264 1508 explore.exe 89 PID 1508 wrote to memory of 264 1508 explore.exe 89 PID 1508 wrote to memory of 264 1508 explore.exe 89 PID 264 wrote to memory of 3988 264 explore.exe 90 PID 264 wrote to memory of 3988 264 explore.exe 90 PID 264 wrote to memory of 3988 264 explore.exe 90 PID 3988 wrote to memory of 3188 3988 explore.exe 91 PID 3988 wrote to memory of 3188 3988 explore.exe 91 PID 3988 wrote to memory of 3188 3988 explore.exe 91 PID 3188 wrote to memory of 4344 3188 explore.exe 94 PID 3188 wrote to memory of 4344 3188 explore.exe 94 PID 3188 wrote to memory of 4344 3188 explore.exe 94 PID 4344 wrote to memory of 4480 4344 explore.exe 96 PID 4344 wrote to memory of 4480 4344 explore.exe 96 PID 4344 wrote to memory of 4480 4344 explore.exe 96 PID 4480 wrote to memory of 2260 4480 explore.exe 98 PID 4480 wrote to memory of 2260 4480 explore.exe 98 PID 4480 wrote to memory of 2260 4480 explore.exe 98 PID 2260 wrote to memory of 916 2260 explore.exe 99 PID 2260 wrote to memory of 916 2260 explore.exe 99 PID 2260 wrote to memory of 916 2260 explore.exe 99 PID 916 wrote to memory of 3668 916 explore.exe 100 PID 916 wrote to memory of 3668 916 explore.exe 100 PID 916 wrote to memory of 3668 916 explore.exe 100 PID 3668 wrote to memory of 1864 3668 explore.exe 101 PID 3668 wrote to memory of 1864 3668 explore.exe 101 PID 3668 wrote to memory of 1864 3668 explore.exe 101 PID 1864 wrote to memory of 4936 1864 explore.exe 104 PID 1864 wrote to memory of 4936 1864 explore.exe 104 PID 1864 wrote to memory of 4936 1864 explore.exe 104 PID 4936 wrote to memory of 1472 4936 explore.exe 130 PID 4936 wrote to memory of 1472 4936 explore.exe 130 PID 4936 wrote to memory of 1472 4936 explore.exe 130 PID 1472 wrote to memory of 1536 1472 explore.exe 131 PID 1472 wrote to memory of 1536 1472 explore.exe 131 PID 1472 wrote to memory of 1536 1472 explore.exe 131 PID 1536 wrote to memory of 1820 1536 explore.exe 107 PID 1536 wrote to memory of 1820 1536 explore.exe 107 PID 1536 wrote to memory of 1820 1536 explore.exe 107 PID 1820 wrote to memory of 4044 1820 explore.exe 108 PID 1820 wrote to memory of 4044 1820 explore.exe 108 PID 1820 wrote to memory of 4044 1820 explore.exe 108 PID 4044 wrote to memory of 1792 4044 explore.exe 109 PID 4044 wrote to memory of 1792 4044 explore.exe 109 PID 4044 wrote to memory of 1792 4044 explore.exe 109 PID 1792 wrote to memory of 4028 1792 explore.exe 110 PID 1792 wrote to memory of 4028 1792 explore.exe 110
Processes
-
C:\Users\Admin\AppData\Local\Temp\98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\98b9cdb8538396beac04570b859cbc71_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1644 -
C:\Windows\Program.EXE"C:\Windows\Program.EXE"2⤵
- Checks computer location settings
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"5⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4720 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"7⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:264 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"8⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3988 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"9⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3188 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"10⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"11⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"13⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"14⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"15⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4936 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"17⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"19⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4044 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"22⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4028 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"23⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:2704 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"24⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:1508 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"25⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4192 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"26⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2712 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"27⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:3280 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"28⤵
- Executes dropped EXE
PID:2988 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:444 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:3836 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"32⤵
- Checks computer location settings
- Executes dropped EXE
PID:316 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"33⤵
- Executes dropped EXE
- Modifies registry class
PID:2420 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"35⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2932 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
PID:1520 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"37⤵
- Executes dropped EXE
- Modifies registry class
PID:4412 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3340 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"39⤵
- Executes dropped EXE
PID:1472 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"40⤵
- Executes dropped EXE
PID:1536 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"41⤵
- Checks computer location settings
- Executes dropped EXE
PID:464 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"42⤵
- Executes dropped EXE
PID:2360 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"43⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4992 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:232 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"45⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4608 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"46⤵
- Executes dropped EXE
PID:1692 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"47⤵
- Checks computer location settings
- Executes dropped EXE
PID:2268 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"48⤵
- Executes dropped EXE
PID:4192 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"49⤵
- Executes dropped EXE
- Modifies registry class
PID:2884 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"50⤵
- Executes dropped EXE
PID:3912 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"51⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:992 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2244 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"53⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
PID:1844 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"54⤵
- Executes dropped EXE
PID:5024 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"55⤵
- Executes dropped EXE
PID:3816 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5004 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"57⤵
- Executes dropped EXE
PID:4340 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"58⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3356 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"59⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:2968 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"60⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2280 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"61⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4160 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"62⤵
- Executes dropped EXE
- Modifies registry class
PID:4760 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"63⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:464 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
PID:2912 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"65⤵
- System Location Discovery: System Language Discovery
PID:4880 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"66⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4828 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"67⤵
- Checks computer location settings
PID:4388 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"68⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:3808 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"69⤵
- Adds Run key to start application
PID:2960 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"70⤵
- System Location Discovery: System Language Discovery
PID:3188 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"71⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"72⤵PID:5012
-
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"73⤵
- Checks computer location settings
PID:2988 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"74⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4276 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"75⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
PID:1272 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"76⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3100 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"77⤵
- Drops file in System32 directory
- Modifies registry class
PID:2440 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"78⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2616 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"79⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4404 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"80⤵
- Drops file in System32 directory
PID:3684 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"81⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:364 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"82⤵PID:4456
-
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"83⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2280 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"84⤵PID:1176
-
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"85⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:2708 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"87⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4968 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"88⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:408 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"89⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3960 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"90⤵PID:4608
-
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"91⤵
- Drops file in System32 directory
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"92⤵PID:4556
-
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"93⤵
- Checks computer location settings
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:8 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"94⤵
- Modifies registry class
PID:2712 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"95⤵
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"96⤵
- Drops file in System32 directory
PID:2156 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"97⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2136 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"98⤵
- Checks computer location settings
PID:4832 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"99⤵
- Checks computer location settings
- Adds Run key to start application
- Drops file in System32 directory
- Modifies registry class
PID:944 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"100⤵
- Adds Run key to start application
- Modifies registry class
PID:916 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"101⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3760 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"102⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4200 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"103⤵
- Drops file in System32 directory
PID:4188 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"104⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1864 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"105⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4124 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"106⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:60 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"107⤵
- Modifies registry class
PID:3220 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"108⤵
- Checks computer location settings
- Modifies registry class
PID:4664 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"109⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4044 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"110⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2112 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"111⤵
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"112⤵
- Adds Run key to start application
- Modifies registry class
PID:752 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"113⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1000 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"114⤵
- Checks computer location settings
- Modifies registry class
PID:408 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"115⤵
- System Location Discovery: System Language Discovery
PID:4896 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"116⤵
- Adds Run key to start application
PID:3640 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"117⤵
- Modifies registry class
PID:3488 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"118⤵
- Adds Run key to start application
PID:4876 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"119⤵
- Adds Run key to start application
PID:1756 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"120⤵PID:4480
-
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"121⤵
- Checks computer location settings
- Adds Run key to start application
- Modifies registry class
PID:3088 -
C:\Windows\SysWOW64\explore.exe"C:\Windows\system32\explore.exe"122⤵
- Adds Run key to start application
PID:4176
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-