Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 01:26
Static task
static1
Behavioral task
behavioral1
Sample
9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe
-
Size
199KB
-
MD5
9f0a556061374d6ddd189b0f487c3975
-
SHA1
bd97e50faa6eb660249cb4dbae2119c3d114b2d7
-
SHA256
f436765ff183c0e9f274db6a0bb1a366743987215d8a9a10bed877f8997690ea
-
SHA512
b7cdea247894b1bbd771a971dd7a5283107a58f109c173e42ee585a5e6cc24a278b0b33bfdd44a0582b757924ff98601c1c74a2753242200d7b9248ce91802c6
-
SSDEEP
3072:pI/TvP5e7E9XY92n2Az51uHuiSivnE4St1zqf0NlKx7k/dhm4t3hEV6:pI7vPBW9qbz5AHuRtb1+8Ngx7kPms3hB
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
Processes:
tazebama.dl_description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" tazebama.dl_ -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 1 IoCs
Processes:
tazebama.dl_description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" tazebama.dl_ -
Executes dropped EXE 64 IoCs
Processes:
tazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exepid Process 2204 tazebama.dl_ 2464 SVOHOST.exe 2792 tazebama.dl_ 2932 SVOHOST.exe 980 tazebama.dl_ 2004 SVOHOST.exe 2952 tazebama.dl_ 1744 SVOHOST.exe 800 tazebama.dl_ 2068 SVOHOST.exe 2152 tazebama.dl_ 2248 SVOHOST.exe 2428 tazebama.dl_ 1604 SVOHOST.exe 836 tazebama.dl_ 2156 SVOHOST.exe 912 tazebama.dl_ 596 SVOHOST.exe 1032 tazebama.dl_ 556 SVOHOST.exe 2032 tazebama.dl_ 992 SVOHOST.exe 888 tazebama.dl_ 2252 SVOHOST.exe 1952 tazebama.dl_ 2572 SVOHOST.exe 1700 tazebama.dl_ 2500 SVOHOST.exe 2768 tazebama.dl_ 2884 SVOHOST.exe 2936 tazebama.dl_ 2660 SVOHOST.exe 2612 tazebama.dl_ 2664 SVOHOST.exe 2672 tazebama.dl_ 1288 SVOHOST.exe 2868 tazebama.dl_ 1640 SVOHOST.exe 1996 tazebama.dl_ 2844 SVOHOST.exe 768 tazebama.dl_ 1860 SVOHOST.exe 1416 tazebama.dl_ 2520 SVOHOST.exe 2200 tazebama.dl_ 2360 SVOHOST.exe 2068 tazebama.dl_ 856 SVOHOST.exe 448 tazebama.dl_ 2436 SVOHOST.exe 2424 tazebama.dl_ 1536 SVOHOST.exe 1660 tazebama.dl_ 2076 SVOHOST.exe 1360 tazebama.dl_ 2064 SVOHOST.exe 1172 tazebama.dl_ 2192 SVOHOST.exe 2168 tazebama.dl_ 1944 SVOHOST.exe 2252 tazebama.dl_ 1700 SVOHOST.exe 2560 tazebama.dl_ 3044 SVOHOST.exe -
Loads dropped DLL 64 IoCs
Processes:
9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exeWerFault.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exepid Process 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2892 WerFault.exe 2892 WerFault.exe 2892 WerFault.exe 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2464 SVOHOST.exe 2464 SVOHOST.exe 2464 SVOHOST.exe 2892 WerFault.exe 2464 SVOHOST.exe 2464 SVOHOST.exe 2932 SVOHOST.exe 2932 SVOHOST.exe 2932 SVOHOST.exe 2932 SVOHOST.exe 2932 SVOHOST.exe 2004 SVOHOST.exe 2004 SVOHOST.exe 2004 SVOHOST.exe 2004 SVOHOST.exe 2004 SVOHOST.exe 1744 SVOHOST.exe 1744 SVOHOST.exe 1744 SVOHOST.exe 1744 SVOHOST.exe 1744 SVOHOST.exe 2068 SVOHOST.exe 2068 SVOHOST.exe 2068 SVOHOST.exe 2068 SVOHOST.exe 2068 SVOHOST.exe 2248 SVOHOST.exe 2248 SVOHOST.exe 2248 SVOHOST.exe 2248 SVOHOST.exe 2248 SVOHOST.exe 1604 SVOHOST.exe 1604 SVOHOST.exe 1604 SVOHOST.exe 1604 SVOHOST.exe 1604 SVOHOST.exe 2156 SVOHOST.exe 2156 SVOHOST.exe 2156 SVOHOST.exe 2156 SVOHOST.exe 2156 SVOHOST.exe 596 SVOHOST.exe 596 SVOHOST.exe 596 SVOHOST.exe 596 SVOHOST.exe 596 SVOHOST.exe 556 SVOHOST.exe 556 SVOHOST.exe 556 SVOHOST.exe 556 SVOHOST.exe 556 SVOHOST.exe 992 SVOHOST.exe 992 SVOHOST.exe 992 SVOHOST.exe 992 SVOHOST.exe 992 SVOHOST.exe -
Adds Run key to start application 2 TTPs 64 IoCs
Processes:
SVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exedescription ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\SoundMam = "C:\\Windows\\system32\\SVOHOST.exe" SVOHOST.exe -
Enumerates connected drives 3 TTPs 64 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
tazebama.dl_tazebama.dl_tazebama.dl_tazebama.dl_tazebama.dl_tazebama.dl_description ioc Process File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\V: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\X: tazebama.dl_ File opened (read-only) \??\O: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\X: tazebama.dl_ File opened (read-only) \??\O: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\R: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\U: tazebama.dl_ File opened (read-only) \??\M: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\P: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ File opened (read-only) \??\W: tazebama.dl_ File opened (read-only) \??\S: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\K: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\H: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\Z: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\E: tazebama.dl_ File opened (read-only) \??\N: tazebama.dl_ File opened (read-only) \??\Q: tazebama.dl_ File opened (read-only) \??\L: tazebama.dl_ File opened (read-only) \??\G: tazebama.dl_ File opened (read-only) \??\T: tazebama.dl_ File opened (read-only) \??\J: tazebama.dl_ File opened (read-only) \??\I: tazebama.dl_ File opened (read-only) \??\Y: tazebama.dl_ -
Drops autorun.inf file 1 TTPs 18 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
Processes:
tazebama.dl_tazebama.dl_tazebama.dl_tazebama.dl_tazebama.dl_tazebama.dl_description ioc Process File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ File opened for modification C:\Documents and Settings\Admin\Local Settings\Application Data\Microsoft\CD Burning\autorun.inf tazebama.dl_ File opened for modification F:\autorun.inf tazebama.dl_ -
Drops file in System32 directory 64 IoCs
Processes:
SVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exedescription ioc Process File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File created C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe File opened for modification C:\Windows\SysWOW64\SVOHOST.exe SVOHOST.exe File opened for modification C:\Windows\SysWOW64\noruns.reg SVOHOST.exe File opened for modification C:\Windows\SysWOW64\winscok.dll SVOHOST.exe -
Drops file in Program Files directory 64 IoCs
Processes:
tazebama.dl_tazebama.dl_description ioc Process File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\BR.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\GU.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\PL.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\PS.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\STATIONERY\STARS.HTM tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\INCLUDE\JAWT.H tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\INCLUDE\JVMTI.H tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\README.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\KO.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\KU.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\INTERNET EXPLORER\TIMELINE.CPU.XML tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\INCLUDE\JNI.H tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\OUTLOOK.EXE tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\MNG.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\PT-BR.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\UG.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\KU-CKB.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\CS.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\DE.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\SQ.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\INCLUDE\JDWPTRANSPORT.H tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\AN.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\HE.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\INCLUDE\JVMTICMLR.H tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\HISTORY.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\LT.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\MNG2.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\THIRDPARTYLICENSEREADME.TXT tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\EXCEL.EXE tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\SI.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\SR-SPL.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\BIN\JVISUALVM.EXE tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\KK.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\EO.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\BG.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\GA.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\STATIONERY\GREEN BUBBLES.HTM tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\INFOPATH.EXE tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\EXT.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\SL.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\TG.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\TR.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\ES.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\FUR.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\NL.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\COMMON FILES\MICROSOFT SHARED\VSTO\10.0\VSTOINSTALLER.CONFIG tazebama.dl_ File opened for modification C:\PROGRAM FILES\DVD MAKER\OFFSET.AX tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\INCLUDE\WIN32\JAWT_MD.H tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\CA.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\JA.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\TK.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\GOOGLE\CHROME\APPLICATION\106.0.5249.119\WIDEVINECDM\_PLATFORM_SPECIFIC tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\DB\README-JDK.HTML tazebama.dl_ File opened for modification C:\PROGRAM FILES\JAVA\JDK1.7.0_80\JRE\README.TXT tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSPUB.EXE tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LICENSE.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\HU.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\MR.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\PT.TXT tazebama.dl_ File opened for modification C:\PROGRA~2\MICROS~1\OFFICE14\MSACCESS.EXE tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\DA.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\FI.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\LANG\ID.TXT tazebama.dl_ File opened for modification C:\PROGRAM FILES\7-ZIP\7-ZIP.CHM tazebama.dl_ -
Launches sc.exe 18 IoCs
Sc.exe is a Windows utlilty to control services on the system.
Processes:
sc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exesc.exepid Process 2076 sc.exe 2472 sc.exe 2612 sc.exe 2560 sc.exe 2356 sc.exe 2520 sc.exe 2648 sc.exe 1436 sc.exe 1288 sc.exe 3000 sc.exe 2004 sc.exe 2636 sc.exe 1556 sc.exe 2264 sc.exe 1784 sc.exe 2568 sc.exe 708 sc.exe 1548 sc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 6 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target Process procid_target 2892 2204 WerFault.exe 30 2408 2200 WerFault.exe 76 1368 316 WerFault.exe 117 1144 2600 WerFault.exe 154 2496 1664 WerFault.exe 185 1028 2684 WerFault.exe 341 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
SVOHOST.exeSVOHOST.exeSVOHOST.exesc.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exesc.exeSVOHOST.exeSVOHOST.exeSVOHOST.exenet1.exenet1.exeSVOHOST.exeSVOHOST.exesc.exeSVOHOST.exesc.exenet1.exenet1.exeSVOHOST.exeSVOHOST.exesc.exeSVOHOST.exetazebama.dl_SVOHOST.exeSVOHOST.exenet1.exenet1.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exesc.exenet.exeSVOHOST.exetazebama.dl_SVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exesc.exenet1.exeSVOHOST.exetazebama.dl_description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tazebama.dl_ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tazebama.dl_ Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language net1.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language SVOHOST.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language tazebama.dl_ -
Runs .reg file with regedit 1 IoCs
Processes:
regedit.exepid Process 1996 regedit.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
tazebama.dl_9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_SVOHOST.exetazebama.dl_pid Process 2204 tazebama.dl_ 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 2792 tazebama.dl_ 2464 SVOHOST.exe 2464 SVOHOST.exe 980 tazebama.dl_ 2932 SVOHOST.exe 2932 SVOHOST.exe 2952 tazebama.dl_ 2004 SVOHOST.exe 2004 SVOHOST.exe 800 tazebama.dl_ 1744 SVOHOST.exe 1744 SVOHOST.exe 2152 tazebama.dl_ 2068 SVOHOST.exe 2068 SVOHOST.exe 2428 tazebama.dl_ 2248 SVOHOST.exe 2248 SVOHOST.exe 836 tazebama.dl_ 1604 SVOHOST.exe 1604 SVOHOST.exe 912 tazebama.dl_ 2156 SVOHOST.exe 2156 SVOHOST.exe 1032 tazebama.dl_ 596 SVOHOST.exe 596 SVOHOST.exe 2032 tazebama.dl_ 556 SVOHOST.exe 556 SVOHOST.exe 888 tazebama.dl_ 992 SVOHOST.exe 992 SVOHOST.exe 1952 tazebama.dl_ 2252 SVOHOST.exe 2252 SVOHOST.exe 1700 tazebama.dl_ 2572 SVOHOST.exe 2572 SVOHOST.exe 2768 tazebama.dl_ 2500 SVOHOST.exe 2500 SVOHOST.exe 2936 tazebama.dl_ 2884 SVOHOST.exe 2884 SVOHOST.exe 2612 tazebama.dl_ 2660 SVOHOST.exe 2660 SVOHOST.exe 2672 tazebama.dl_ 2664 SVOHOST.exe 2664 SVOHOST.exe 2868 tazebama.dl_ 1288 SVOHOST.exe 1288 SVOHOST.exe 1996 tazebama.dl_ 1640 SVOHOST.exe 1640 SVOHOST.exe 768 tazebama.dl_ 2844 SVOHOST.exe 2844 SVOHOST.exe 1416 tazebama.dl_ -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exetazebama.dl_SVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exeSVOHOST.exedescription pid Process procid_target PID 2512 wrote to memory of 2204 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2204 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2204 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 30 PID 2512 wrote to memory of 2204 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 30 PID 2204 wrote to memory of 2892 2204 tazebama.dl_ 31 PID 2204 wrote to memory of 2892 2204 tazebama.dl_ 31 PID 2204 wrote to memory of 2892 2204 tazebama.dl_ 31 PID 2204 wrote to memory of 2892 2204 tazebama.dl_ 31 PID 2512 wrote to memory of 2464 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 32 PID 2512 wrote to memory of 2464 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 32 PID 2512 wrote to memory of 2464 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 32 PID 2512 wrote to memory of 2464 2512 9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe 32 PID 2464 wrote to memory of 2792 2464 SVOHOST.exe 33 PID 2464 wrote to memory of 2792 2464 SVOHOST.exe 33 PID 2464 wrote to memory of 2792 2464 SVOHOST.exe 33 PID 2464 wrote to memory of 2792 2464 SVOHOST.exe 33 PID 2464 wrote to memory of 2932 2464 SVOHOST.exe 34 PID 2464 wrote to memory of 2932 2464 SVOHOST.exe 34 PID 2464 wrote to memory of 2932 2464 SVOHOST.exe 34 PID 2464 wrote to memory of 2932 2464 SVOHOST.exe 34 PID 2932 wrote to memory of 980 2932 SVOHOST.exe 35 PID 2932 wrote to memory of 980 2932 SVOHOST.exe 35 PID 2932 wrote to memory of 980 2932 SVOHOST.exe 35 PID 2932 wrote to memory of 980 2932 SVOHOST.exe 35 PID 2932 wrote to memory of 2004 2932 SVOHOST.exe 36 PID 2932 wrote to memory of 2004 2932 SVOHOST.exe 36 PID 2932 wrote to memory of 2004 2932 SVOHOST.exe 36 PID 2932 wrote to memory of 2004 2932 SVOHOST.exe 36 PID 2004 wrote to memory of 2952 2004 SVOHOST.exe 37 PID 2004 wrote to memory of 2952 2004 SVOHOST.exe 37 PID 2004 wrote to memory of 2952 2004 SVOHOST.exe 37 PID 2004 wrote to memory of 2952 2004 SVOHOST.exe 37 PID 2004 wrote to memory of 1744 2004 SVOHOST.exe 38 PID 2004 wrote to memory of 1744 2004 SVOHOST.exe 38 PID 2004 wrote to memory of 1744 2004 SVOHOST.exe 38 PID 2004 wrote to memory of 1744 2004 SVOHOST.exe 38 PID 1744 wrote to memory of 800 1744 SVOHOST.exe 39 PID 1744 wrote to memory of 800 1744 SVOHOST.exe 39 PID 1744 wrote to memory of 800 1744 SVOHOST.exe 39 PID 1744 wrote to memory of 800 1744 SVOHOST.exe 39 PID 1744 wrote to memory of 2068 1744 SVOHOST.exe 40 PID 1744 wrote to memory of 2068 1744 SVOHOST.exe 40 PID 1744 wrote to memory of 2068 1744 SVOHOST.exe 40 PID 1744 wrote to memory of 2068 1744 SVOHOST.exe 40 PID 2068 wrote to memory of 2152 2068 SVOHOST.exe 41 PID 2068 wrote to memory of 2152 2068 SVOHOST.exe 41 PID 2068 wrote to memory of 2152 2068 SVOHOST.exe 41 PID 2068 wrote to memory of 2152 2068 SVOHOST.exe 41 PID 2068 wrote to memory of 2248 2068 SVOHOST.exe 42 PID 2068 wrote to memory of 2248 2068 SVOHOST.exe 42 PID 2068 wrote to memory of 2248 2068 SVOHOST.exe 42 PID 2068 wrote to memory of 2248 2068 SVOHOST.exe 42 PID 2248 wrote to memory of 2428 2248 SVOHOST.exe 43 PID 2248 wrote to memory of 2428 2248 SVOHOST.exe 43 PID 2248 wrote to memory of 2428 2248 SVOHOST.exe 43 PID 2248 wrote to memory of 2428 2248 SVOHOST.exe 43 PID 2248 wrote to memory of 1604 2248 SVOHOST.exe 44 PID 2248 wrote to memory of 1604 2248 SVOHOST.exe 44 PID 2248 wrote to memory of 1604 2248 SVOHOST.exe 44 PID 2248 wrote to memory of 1604 2248 SVOHOST.exe 44 PID 1604 wrote to memory of 836 1604 SVOHOST.exe 45 PID 1604 wrote to memory of 836 1604 SVOHOST.exe 45 PID 1604 wrote to memory of 836 1604 SVOHOST.exe 45 PID 1604 wrote to memory of 836 1604 SVOHOST.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\9f0a556061374d6ddd189b0f487c3975_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2204 -s 3203⤵
- Loads dropped DLL
- Program crash
PID:2892
-
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2792
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"4⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:980
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"5⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2952
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"6⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:800
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"7⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2152
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2428
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"9⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:836
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2156 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"10⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:912
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:596 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"11⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1032
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:556 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"12⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2032
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:992 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"13⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:888
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"13⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2252 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1952
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"14⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2572 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"15⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1700
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"15⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2500 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"16⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2768
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2884 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"17⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2936
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"17⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2660 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"18⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2612
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"18⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"19⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2672
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1288 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2868
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"20⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1640 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1996
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"21⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2844 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"22⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:768
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"22⤵
- Executes dropped EXE
PID:1860 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"23⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1416
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"23⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2520 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"24⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:2200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 32425⤵
- Program crash
PID:2408
-
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"24⤵
- Executes dropped EXE
PID:2360 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"25⤵
- Executes dropped EXE
PID:2068
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"25⤵
- Executes dropped EXE
PID:856 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"26⤵
- Executes dropped EXE
PID:448
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2436 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"27⤵
- Executes dropped EXE
PID:2424
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"27⤵
- Executes dropped EXE
PID:1536 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"28⤵
- Executes dropped EXE
PID:1660
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"28⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2076 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"29⤵
- Executes dropped EXE
PID:1360
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2064 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"30⤵
- Executes dropped EXE
PID:1172
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"30⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2192 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"31⤵
- Executes dropped EXE
PID:2168
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"31⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1944 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"32⤵
- Executes dropped EXE
PID:2252
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1700 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"33⤵
- Executes dropped EXE
PID:2560
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"33⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3044 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"34⤵PID:2752
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"34⤵
- Drops file in System32 directory
PID:3000 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"35⤵PID:2644
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"35⤵
- Adds Run key to start application
PID:2612 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"36⤵PID:2692
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"36⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"37⤵PID:2028
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"37⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2972 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"38⤵PID:2296
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"38⤵
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"39⤵PID:1500
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"39⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1968 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"40⤵PID:2892
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"40⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2264 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"41⤵PID:1880
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"41⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2184 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"42⤵PID:2140
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"42⤵PID:2600
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"43⤵PID:1920
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"43⤵
- Adds Run key to start application
PID:380 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"44⤵
- Enumerates connected drives
- Drops autorun.inf file
PID:316 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 316 -s 32045⤵
- Program crash
PID:1368
-
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"44⤵
- System Location Discovery: System Language Discovery
PID:616 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"45⤵PID:2232
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"45⤵
- Drops file in System32 directory
PID:1900 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"46⤵PID:780
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"46⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:276 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"47⤵PID:1172
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"47⤵
- Adds Run key to start application
PID:2556 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"48⤵PID:2336
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"48⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2192 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"49⤵PID:2592
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"49⤵PID:1944
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"50⤵PID:2904
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"50⤵
- System Location Discovery: System Language Discovery
PID:2772 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"51⤵PID:2916
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"51⤵
- Drops file in System32 directory
PID:3044 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"52⤵PID:1048
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"52⤵
- Adds Run key to start application
PID:2796 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"53⤵PID:2788
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"53⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"54⤵PID:2612
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"54⤵
- Adds Run key to start application
PID:848 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"55⤵PID:2112
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"55⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1396 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"56⤵PID:2828
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"56⤵
- System Location Discovery: System Language Discovery
PID:3016 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"57⤵PID:2844
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"57⤵
- System Location Discovery: System Language Discovery
PID:2744 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"58⤵PID:2016
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"58⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:884 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"59⤵PID:2372
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"59⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1204 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"60⤵PID:1136
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"60⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2148 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"61⤵PID:3056
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"61⤵
- Adds Run key to start application
PID:1920 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"62⤵
- Enumerates connected drives
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:2600 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 32063⤵
- Program crash
PID:1144
-
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"62⤵
- Drops file in System32 directory
PID:2436 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"63⤵PID:3048
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"63⤵
- System Location Discovery: System Language Discovery
PID:1536 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"64⤵PID:872
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"64⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:564 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"65⤵PID:2528
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"65⤵
- Drops file in System32 directory
PID:1580 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"66⤵PID:1724
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"66⤵PID:2388
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"67⤵PID:2960
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"67⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:892 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"68⤵PID:2728
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"68⤵
- Adds Run key to start application
PID:2976 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"69⤵PID:2752
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"69⤵
- Adds Run key to start application
PID:2884 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"70⤵PID:2876
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"70⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2788 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"71⤵PID:2796
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"71⤵
- Drops file in System32 directory
PID:560 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"72⤵PID:2868
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2840 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"73⤵PID:1992
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"73⤵
- System Location Discovery: System Language Discovery
PID:2720 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"74⤵PID:2212
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"75⤵PID:2900
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"75⤵
- Adds Run key to start application
PID:1968 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"76⤵PID:800
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"76⤵
- Drops file in System32 directory
PID:2516 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"77⤵
- Enumerates connected drives
- Drops autorun.inf file
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1664 -s 32078⤵
- Program crash
PID:2496
-
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"77⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1888 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"78⤵PID:708
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"78⤵PID:1696
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"79⤵PID:1328
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"79⤵
- System Location Discovery: System Language Discovery
PID:2136 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"80⤵PID:1660
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"80⤵PID:1564
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"81⤵PID:2056
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"81⤵PID:2076
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"82⤵PID:1536
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"82⤵PID:2528
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"83⤵PID:1688
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"83⤵PID:2328
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"84⤵PID:1724
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"84⤵PID:1628
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"85⤵PID:2568
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"85⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"86⤵PID:2924
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"86⤵
- Adds Run key to start application
PID:2500 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"87⤵PID:1732
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"87⤵
- Adds Run key to start application
PID:2784 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"88⤵PID:2676
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"88⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"89⤵PID:2656
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"89⤵
- Drops file in System32 directory
PID:2464 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"90⤵PID:2992
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"90⤵
- Drops file in System32 directory
PID:2848 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"91⤵PID:2688
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"91⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2980 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"92⤵PID:2636
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"92⤵
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"93⤵PID:1864
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"93⤵
- Drops file in System32 directory
PID:1416 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"94⤵PID:2928
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"94⤵
- Adds Run key to start application
PID:1144 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"95⤵PID:800
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"95⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"96⤵PID:2816
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"96⤵
- System Location Discovery: System Language Discovery
PID:1604 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"97⤵PID:2520
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"97⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2248 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"98⤵PID:956
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"98⤵PID:2428
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"99⤵PID:1072
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"99⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:304 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"100⤵
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in Program Files directory
PID:1636
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"100⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:880 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"101⤵PID:2060
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"101⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"102⤵PID:1916
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"102⤵
- Adds Run key to start application
PID:2712 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"103⤵PID:2828
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"103⤵PID:1728
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"104⤵PID:2908
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"104⤵
- Drops file in System32 directory
PID:2640 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"105⤵PID:1200
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"105⤵
- Adds Run key to start application
PID:2464 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"106⤵PID:2952
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"106⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2636 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"107⤵PID:2060
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"107⤵
- Drops file in System32 directory
PID:2132 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"108⤵PID:1868
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"108⤵
- Drops file in System32 directory
PID:996 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"109⤵PID:2596
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"109⤵
- Drops file in System32 directory
PID:1068 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"110⤵PID:1888
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"110⤵PID:1764
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"111⤵PID:3016
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"111⤵PID:952
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"112⤵PID:904
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"112⤵
- Drops file in System32 directory
PID:1552 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"113⤵PID:3060
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"113⤵PID:1472
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"114⤵PID:2436
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"114⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1032 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"115⤵PID:536
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"115⤵PID:2284
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"116⤵PID:2340
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"116⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2100 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"117⤵PID:2904
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"117⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:892 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"118⤵PID:1960
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"118⤵
- Adds Run key to start application
PID:2760 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"119⤵PID:2784
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"119⤵PID:2656
-
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"120⤵PID:1484
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"120⤵
- Adds Run key to start application
PID:2788 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"121⤵PID:2632
-
-
C:\Windows\SysWOW64\SVOHOST.exe"C:\Windows\system32\SVOHOST.exe"121⤵
- System Location Discovery: System Language Discovery
PID:2932 -
C:\Documents and Settings\tazebama.dl_"C:\Documents and Settings\tazebama.dl_"122⤵PID:2840
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-