Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2024 11:47
Static task
static1
Behavioral task
behavioral1
Sample
a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe
-
Size
267KB
-
MD5
a1bdbd9dd382218492ae030ac5583d5b
-
SHA1
e0a85cacf27bd38b868c23e000f35c757b2751ab
-
SHA256
f47cf6692d019d6858c76b9fb1876f6475bd17463ba6178472c5eec45a4caef8
-
SHA512
294f77494c66099d6f3d5c08e94310b5706178b172504019e084effc91cfaefcb486f461d79f4403a18f8c0fa3132a17fe28d3fd0efffaf195a86927582fba0d
-
SSDEEP
6144:fc0TbSwrbQpuYp6qdwXG3uMHNvU/OkGhuqBF0mF+2cXTXfrgR:NTbSKysqdPDHBjFB+2cXQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 55 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation wcoredg.exe -
Deletes itself 1 IoCs
pid Process 1956 wcoredg.exe -
Executes dropped EXE 64 IoCs
pid Process 2988 wcoredg.exe 1956 wcoredg.exe 4176 wcoredg.exe 2572 wcoredg.exe 4888 wcoredg.exe 1476 wcoredg.exe 1480 wcoredg.exe 2952 wcoredg.exe 4788 wcoredg.exe 3788 wcoredg.exe 3092 wcoredg.exe 2124 wcoredg.exe 3512 wcoredg.exe 2604 wcoredg.exe 3928 wcoredg.exe 2916 wcoredg.exe 2680 wcoredg.exe 4536 wcoredg.exe 4020 wcoredg.exe 3644 wcoredg.exe 116 wcoredg.exe 2832 wcoredg.exe 2644 wcoredg.exe 4980 wcoredg.exe 2476 wcoredg.exe 3264 wcoredg.exe 3960 wcoredg.exe 2992 wcoredg.exe 2412 wcoredg.exe 5024 wcoredg.exe 2356 wcoredg.exe 3816 wcoredg.exe 2820 wcoredg.exe 3416 wcoredg.exe 4440 wcoredg.exe 4672 wcoredg.exe 1940 wcoredg.exe 3148 wcoredg.exe 4444 wcoredg.exe 448 wcoredg.exe 4296 wcoredg.exe 4676 wcoredg.exe 4896 wcoredg.exe 5012 wcoredg.exe 1932 wcoredg.exe 3964 wcoredg.exe 4424 wcoredg.exe 4432 wcoredg.exe 4416 wcoredg.exe 2528 wcoredg.exe 1792 wcoredg.exe 4436 wcoredg.exe 4924 wcoredg.exe 3672 wcoredg.exe 4852 wcoredg.exe 2284 wcoredg.exe 4268 wcoredg.exe 5104 wcoredg.exe 4936 wcoredg.exe 4704 wcoredg.exe 2028 wcoredg.exe 3492 wcoredg.exe 2684 wcoredg.exe 1224 wcoredg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe -
Suspicious use of SetThreadContext 55 IoCs
description pid Process procid_target PID 228 set thread context of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 2988 set thread context of 1956 2988 wcoredg.exe 87 PID 4176 set thread context of 2572 4176 wcoredg.exe 93 PID 4888 set thread context of 1476 4888 wcoredg.exe 97 PID 1480 set thread context of 2952 1480 wcoredg.exe 102 PID 4788 set thread context of 3788 4788 wcoredg.exe 104 PID 3092 set thread context of 2124 3092 wcoredg.exe 106 PID 3512 set thread context of 2604 3512 wcoredg.exe 108 PID 3928 set thread context of 2916 3928 wcoredg.exe 110 PID 2680 set thread context of 4536 2680 wcoredg.exe 112 PID 4020 set thread context of 3644 4020 wcoredg.exe 114 PID 116 set thread context of 2832 116 wcoredg.exe 118 PID 2644 set thread context of 4980 2644 wcoredg.exe 120 PID 2476 set thread context of 3264 2476 wcoredg.exe 122 PID 3960 set thread context of 2992 3960 wcoredg.exe 124 PID 2412 set thread context of 5024 2412 wcoredg.exe 126 PID 2356 set thread context of 3816 2356 wcoredg.exe 128 PID 2820 set thread context of 3416 2820 wcoredg.exe 130 PID 4440 set thread context of 4672 4440 wcoredg.exe 132 PID 1940 set thread context of 3148 1940 wcoredg.exe 134 PID 4444 set thread context of 448 4444 wcoredg.exe 136 PID 4296 set thread context of 4676 4296 wcoredg.exe 138 PID 4896 set thread context of 5012 4896 wcoredg.exe 140 PID 1932 set thread context of 3964 1932 wcoredg.exe 142 PID 4424 set thread context of 4432 4424 wcoredg.exe 144 PID 4416 set thread context of 2528 4416 wcoredg.exe 146 PID 1792 set thread context of 4436 1792 wcoredg.exe 148 PID 4924 set thread context of 3672 4924 wcoredg.exe 150 PID 4852 set thread context of 2284 4852 wcoredg.exe 152 PID 4268 set thread context of 5104 4268 wcoredg.exe 154 PID 4936 set thread context of 4704 4936 wcoredg.exe 156 PID 2028 set thread context of 3492 2028 wcoredg.exe 158 PID 2684 set thread context of 1224 2684 wcoredg.exe 160 PID 2948 set thread context of 3468 2948 wcoredg.exe 162 PID 3152 set thread context of 1596 3152 wcoredg.exe 166 PID 4444 set thread context of 4496 4444 wcoredg.exe 168 PID 3512 set thread context of 1872 3512 wcoredg.exe 170 PID 4896 set thread context of 4804 4896 wcoredg.exe 172 PID 2680 set thread context of 1776 2680 wcoredg.exe 174 PID 3720 set thread context of 3704 3720 wcoredg.exe 176 PID 4520 set thread context of 2480 4520 wcoredg.exe 178 PID 2304 set thread context of 468 2304 wcoredg.exe 180 PID 2576 set thread context of 3996 2576 wcoredg.exe 182 PID 2404 set thread context of 612 2404 wcoredg.exe 184 PID 3528 set thread context of 4468 3528 wcoredg.exe 186 PID 2776 set thread context of 4568 2776 wcoredg.exe 188 PID 4600 set thread context of 3556 4600 wcoredg.exe 190 PID 2012 set thread context of 2892 2012 wcoredg.exe 192 PID 2684 set thread context of 880 2684 wcoredg.exe 194 PID 2884 set thread context of 2648 2884 wcoredg.exe 196 PID 4552 set thread context of 2240 4552 wcoredg.exe 198 PID 1068 set thread context of 4312 1068 wcoredg.exe 200 PID 2088 set thread context of 2844 2088 wcoredg.exe 202 PID 4412 set thread context of 4104 4412 wcoredg.exe 204 PID 1544 set thread context of 5108 1544 wcoredg.exe 206 -
resource yara_rule behavioral2/memory/4940-0-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4940-2-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4940-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4940-4-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4940-38-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1956-43-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1956-44-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1956-45-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1956-49-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2572-57-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1476-64-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2952-73-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3788-79-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2124-88-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2604-94-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2916-101-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4536-110-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3644-117-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2832-124-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4980-133-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3264-141-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2992-149-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5024-157-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3816-165-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3416-173-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4672-181-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3148-189-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/448-197-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4676-205-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5012-213-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3964-219-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4432-225-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2528-231-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4436-237-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3672-243-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2284-249-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/5104-255-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4704-261-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3492-267-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1224-273-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3468-279-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1596-285-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4496-291-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1872-297-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4804-303-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/1776-309-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3704-315-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2480-321-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/468-327-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3996-333-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/612-339-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4468-345-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4568-351-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/3556-357-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2892-363-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/880-369-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2648-375-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2240-381-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4312-387-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/2844-393-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral2/memory/4104-399-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe -
Modifies registry class 55 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ wcoredg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4940 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 4940 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 1956 wcoredg.exe 1956 wcoredg.exe 2572 wcoredg.exe 2572 wcoredg.exe 1476 wcoredg.exe 1476 wcoredg.exe 2952 wcoredg.exe 2952 wcoredg.exe 3788 wcoredg.exe 3788 wcoredg.exe 2124 wcoredg.exe 2124 wcoredg.exe 2604 wcoredg.exe 2604 wcoredg.exe 2916 wcoredg.exe 2916 wcoredg.exe 4536 wcoredg.exe 4536 wcoredg.exe 3644 wcoredg.exe 3644 wcoredg.exe 2832 wcoredg.exe 2832 wcoredg.exe 4980 wcoredg.exe 4980 wcoredg.exe 3264 wcoredg.exe 3264 wcoredg.exe 2992 wcoredg.exe 2992 wcoredg.exe 5024 wcoredg.exe 5024 wcoredg.exe 3816 wcoredg.exe 3816 wcoredg.exe 3416 wcoredg.exe 3416 wcoredg.exe 4672 wcoredg.exe 4672 wcoredg.exe 3148 wcoredg.exe 3148 wcoredg.exe 448 wcoredg.exe 448 wcoredg.exe 4676 wcoredg.exe 4676 wcoredg.exe 5012 wcoredg.exe 5012 wcoredg.exe 3964 wcoredg.exe 3964 wcoredg.exe 4432 wcoredg.exe 4432 wcoredg.exe 2528 wcoredg.exe 2528 wcoredg.exe 4436 wcoredg.exe 4436 wcoredg.exe 3672 wcoredg.exe 3672 wcoredg.exe 2284 wcoredg.exe 2284 wcoredg.exe 5104 wcoredg.exe 5104 wcoredg.exe 4704 wcoredg.exe 4704 wcoredg.exe 3492 wcoredg.exe 3492 wcoredg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 228 wrote to memory of 4940 228 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 83 PID 4940 wrote to memory of 2988 4940 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 84 PID 4940 wrote to memory of 2988 4940 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 84 PID 4940 wrote to memory of 2988 4940 a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe 84 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 2988 wrote to memory of 1956 2988 wcoredg.exe 87 PID 1956 wrote to memory of 4176 1956 wcoredg.exe 92 PID 1956 wrote to memory of 4176 1956 wcoredg.exe 92 PID 1956 wrote to memory of 4176 1956 wcoredg.exe 92 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 4176 wrote to memory of 2572 4176 wcoredg.exe 93 PID 2572 wrote to memory of 4888 2572 wcoredg.exe 96 PID 2572 wrote to memory of 4888 2572 wcoredg.exe 96 PID 2572 wrote to memory of 4888 2572 wcoredg.exe 96 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 4888 wrote to memory of 1476 4888 wcoredg.exe 97 PID 1476 wrote to memory of 1480 1476 wcoredg.exe 101 PID 1476 wrote to memory of 1480 1476 wcoredg.exe 101 PID 1476 wrote to memory of 1480 1476 wcoredg.exe 101 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 1480 wrote to memory of 2952 1480 wcoredg.exe 102 PID 2952 wrote to memory of 4788 2952 wcoredg.exe 103 PID 2952 wrote to memory of 4788 2952 wcoredg.exe 103 PID 2952 wrote to memory of 4788 2952 wcoredg.exe 103 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 4788 wrote to memory of 3788 4788 wcoredg.exe 104 PID 3788 wrote to memory of 3092 3788 wcoredg.exe 105 PID 3788 wrote to memory of 3092 3788 wcoredg.exe 105 PID 3788 wrote to memory of 3092 3788 wcoredg.exe 105 PID 3092 wrote to memory of 2124 3092 wcoredg.exe 106 PID 3092 wrote to memory of 2124 3092 wcoredg.exe 106 PID 3092 wrote to memory of 2124 3092 wcoredg.exe 106 PID 3092 wrote to memory of 2124 3092 wcoredg.exe 106
Processes
-
C:\Users\Admin\AppData\Local\Temp\a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:228 -
C:\Users\Admin\AppData\Local\Temp\a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a1bdbd9dd382218492ae030ac5583d5b_JaffaCakes118.exe"2⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Users\Admin\AppData\Local\Temp\A1BDBD~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Users\Admin\AppData\Local\Temp\A1BDBD~1.EXE4⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4176 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4788 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3788 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3092 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3512 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3928 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2916 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2680 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4536 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4020 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3644 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:116 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2644 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4980 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3264 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3960 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2992 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2412 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5024 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2356 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3816 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3416 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4440 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4672 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1940 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3148 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4444 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:448 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4296 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4676 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4896 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5012 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1932 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3964 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4424 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe50⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4432 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4416 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe52⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2528 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe54⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4436 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4924 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe56⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3672 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4852 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe58⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4268 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe60⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:5104 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4936 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe62⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4704 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2028 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3492 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2684 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe66⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1224 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2948 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe68⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3468 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3152 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe70⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1596 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe71⤵
- Suspicious use of SetThreadContext
PID:4444 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe72⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4496 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe73⤵
- Suspicious use of SetThreadContext
PID:3512 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe74⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1872 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe75⤵
- Suspicious use of SetThreadContext
PID:4896 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4804 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe77⤵
- Suspicious use of SetThreadContext
PID:2680 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe78⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:1776 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe79⤵
- Suspicious use of SetThreadContext
PID:3720 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe80⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3704 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe81⤵
- Suspicious use of SetThreadContext
PID:4520 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe82⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2480 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe83⤵
- Suspicious use of SetThreadContext
PID:2304 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe84⤵
- Checks computer location settings
- Modifies registry class
PID:468 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2576 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe86⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3996 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2404 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe88⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:612 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3528 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe90⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4468 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe92⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4568 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:4600 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe94⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3556 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe96⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2892 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe97⤵
- Suspicious use of SetThreadContext
PID:2684 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe98⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:880 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe99⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe100⤵
- Checks computer location settings
- Modifies registry class
PID:2648 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe101⤵
- Suspicious use of SetThreadContext
PID:4552 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe102⤵
- Checks computer location settings
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2240 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe103⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1068 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe104⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:4312 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2088 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe106⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:2844 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe107⤵
- Suspicious use of SetThreadContext
PID:4412 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe108⤵
- Checks computer location settings
- Modifies registry class
PID:4104 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1544 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe110⤵
- Checks computer location settings
- Drops file in System32 directory
- Modifies registry class
PID:5108 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe111⤵PID:4580
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
267KB
MD5a1bdbd9dd382218492ae030ac5583d5b
SHA1e0a85cacf27bd38b868c23e000f35c757b2751ab
SHA256f47cf6692d019d6858c76b9fb1876f6475bd17463ba6178472c5eec45a4caef8
SHA512294f77494c66099d6f3d5c08e94310b5706178b172504019e084effc91cfaefcb486f461d79f4403a18f8c0fa3132a17fe28d3fd0efffaf195a86927582fba0d