Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26-11-2024 14:54
Static task
static1
Behavioral task
behavioral1
Sample
a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe
Resource
win7-20240708-en
General
-
Target
a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe
-
Size
142KB
-
MD5
a28b528c73a2e5e06b5b535db03b9132
-
SHA1
6b54ee539c8aacdb7b9cd5f6656977019e4c834e
-
SHA256
c57f93ef59e128b92725fa21ea639eef5762db792fd5d9f408a439de976f7573
-
SHA512
485e1ad7ac5781a36ade8e6c233d76c97c723790a3a9c7c817b307023a77d05f295e9933ad9a6da3ef309f4c93acb04102ea2013f62d24c1a33f5fca395a09d4
-
SSDEEP
3072:9N4+69jpWSbgg8LFBAXmlwpqUFCYKwi5s/b:/47jFEgYnA7D1iM
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2640 wiacmfgr.exe -
Executes dropped EXE 64 IoCs
pid Process 2924 wiacmfgr.exe 2640 wiacmfgr.exe 2568 wiacmfgr.exe 2548 wiacmfgr.exe 576 wiacmfgr.exe 620 wiacmfgr.exe 2220 wiacmfgr.exe 1312 wiacmfgr.exe 2492 wiacmfgr.exe 2820 wiacmfgr.exe 1880 wiacmfgr.exe 2860 wiacmfgr.exe 2036 wiacmfgr.exe 472 wiacmfgr.exe 2148 wiacmfgr.exe 2744 wiacmfgr.exe 2940 wiacmfgr.exe 2280 wiacmfgr.exe 2856 wiacmfgr.exe 1724 wiacmfgr.exe 3052 wiacmfgr.exe 680 wiacmfgr.exe 2452 wiacmfgr.exe 2064 wiacmfgr.exe 2456 wiacmfgr.exe 2032 wiacmfgr.exe 2776 wiacmfgr.exe 2792 wiacmfgr.exe 1644 wiacmfgr.exe 2256 wiacmfgr.exe 1052 wiacmfgr.exe 2100 wiacmfgr.exe 1180 wiacmfgr.exe 2128 wiacmfgr.exe 2152 wiacmfgr.exe 1472 wiacmfgr.exe 2340 wiacmfgr.exe 1344 wiacmfgr.exe 1792 wiacmfgr.exe 3012 wiacmfgr.exe 2036 wiacmfgr.exe 2932 wiacmfgr.exe 1984 wiacmfgr.exe 2092 wiacmfgr.exe 800 wiacmfgr.exe 444 wiacmfgr.exe 1300 wiacmfgr.exe 692 wiacmfgr.exe 1736 wiacmfgr.exe 1732 wiacmfgr.exe 2968 wiacmfgr.exe 376 wiacmfgr.exe 2444 wiacmfgr.exe 2296 wiacmfgr.exe 2756 wiacmfgr.exe 2752 wiacmfgr.exe 2660 wiacmfgr.exe 1220 wiacmfgr.exe 2504 wiacmfgr.exe 3000 wiacmfgr.exe 1456 wiacmfgr.exe 1804 wiacmfgr.exe 2224 wiacmfgr.exe 2132 wiacmfgr.exe -
Loads dropped DLL 64 IoCs
pid Process 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 2640 wiacmfgr.exe 2640 wiacmfgr.exe 2548 wiacmfgr.exe 2548 wiacmfgr.exe 620 wiacmfgr.exe 620 wiacmfgr.exe 1312 wiacmfgr.exe 1312 wiacmfgr.exe 2820 wiacmfgr.exe 2820 wiacmfgr.exe 2860 wiacmfgr.exe 2860 wiacmfgr.exe 472 wiacmfgr.exe 472 wiacmfgr.exe 2744 wiacmfgr.exe 2744 wiacmfgr.exe 2280 wiacmfgr.exe 2280 wiacmfgr.exe 1724 wiacmfgr.exe 1724 wiacmfgr.exe 680 wiacmfgr.exe 680 wiacmfgr.exe 2064 wiacmfgr.exe 2064 wiacmfgr.exe 2032 wiacmfgr.exe 2032 wiacmfgr.exe 2792 wiacmfgr.exe 2792 wiacmfgr.exe 2256 wiacmfgr.exe 2256 wiacmfgr.exe 2100 wiacmfgr.exe 2100 wiacmfgr.exe 2128 wiacmfgr.exe 2128 wiacmfgr.exe 1472 wiacmfgr.exe 1472 wiacmfgr.exe 1344 wiacmfgr.exe 1344 wiacmfgr.exe 3012 wiacmfgr.exe 3012 wiacmfgr.exe 2932 wiacmfgr.exe 2932 wiacmfgr.exe 2092 wiacmfgr.exe 2092 wiacmfgr.exe 444 wiacmfgr.exe 444 wiacmfgr.exe 692 wiacmfgr.exe 692 wiacmfgr.exe 1732 wiacmfgr.exe 1732 wiacmfgr.exe 376 wiacmfgr.exe 376 wiacmfgr.exe 2296 wiacmfgr.exe 2296 wiacmfgr.exe 2752 wiacmfgr.exe 2752 wiacmfgr.exe 1220 wiacmfgr.exe 1220 wiacmfgr.exe 3000 wiacmfgr.exe 3000 wiacmfgr.exe 1804 wiacmfgr.exe 1804 wiacmfgr.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA wiacmfgr.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File opened for modification C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe File created C:\Windows\SysWOW64\wiacmfgr.exe wiacmfgr.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2200 set thread context of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2924 set thread context of 2640 2924 wiacmfgr.exe 32 PID 2568 set thread context of 2548 2568 wiacmfgr.exe 34 PID 576 set thread context of 620 576 wiacmfgr.exe 36 PID 2220 set thread context of 1312 2220 wiacmfgr.exe 38 PID 2492 set thread context of 2820 2492 wiacmfgr.exe 40 PID 1880 set thread context of 2860 1880 wiacmfgr.exe 42 PID 2036 set thread context of 472 2036 wiacmfgr.exe 44 PID 2148 set thread context of 2744 2148 wiacmfgr.exe 46 PID 2940 set thread context of 2280 2940 wiacmfgr.exe 48 PID 2856 set thread context of 1724 2856 wiacmfgr.exe 50 PID 3052 set thread context of 680 3052 wiacmfgr.exe 52 PID 2452 set thread context of 2064 2452 wiacmfgr.exe 54 PID 2456 set thread context of 2032 2456 wiacmfgr.exe 56 PID 2776 set thread context of 2792 2776 wiacmfgr.exe 59 PID 1644 set thread context of 2256 1644 wiacmfgr.exe 61 PID 1052 set thread context of 2100 1052 wiacmfgr.exe 63 PID 1180 set thread context of 2128 1180 wiacmfgr.exe 65 PID 2152 set thread context of 1472 2152 wiacmfgr.exe 67 PID 2340 set thread context of 1344 2340 wiacmfgr.exe 69 PID 1792 set thread context of 3012 1792 wiacmfgr.exe 71 PID 2036 set thread context of 2932 2036 wiacmfgr.exe 73 PID 1984 set thread context of 2092 1984 wiacmfgr.exe 75 PID 800 set thread context of 444 800 wiacmfgr.exe 77 PID 1300 set thread context of 692 1300 wiacmfgr.exe 79 PID 1736 set thread context of 1732 1736 wiacmfgr.exe 81 PID 2968 set thread context of 376 2968 wiacmfgr.exe 83 PID 2444 set thread context of 2296 2444 wiacmfgr.exe 85 PID 2756 set thread context of 2752 2756 wiacmfgr.exe 87 PID 2660 set thread context of 1220 2660 wiacmfgr.exe 89 PID 2504 set thread context of 3000 2504 wiacmfgr.exe 91 PID 1456 set thread context of 1804 1456 wiacmfgr.exe 93 PID 2224 set thread context of 2132 2224 wiacmfgr.exe 95 PID 2700 set thread context of 2712 2700 wiacmfgr.exe 97 PID 1660 set thread context of 2832 1660 wiacmfgr.exe 99 PID 1292 set thread context of 2016 1292 wiacmfgr.exe 101 PID 2020 set thread context of 2228 2020 wiacmfgr.exe 103 PID 2140 set thread context of 1984 2140 wiacmfgr.exe 105 PID 2288 set thread context of 2088 2288 wiacmfgr.exe 107 PID 1588 set thread context of 752 1588 wiacmfgr.exe 109 PID 1708 set thread context of 1736 1708 wiacmfgr.exe 111 PID 2284 set thread context of 2984 2284 wiacmfgr.exe 113 PID 1056 set thread context of 1680 1056 wiacmfgr.exe 115 PID 1072 set thread context of 2428 1072 wiacmfgr.exe 117 PID 1836 set thread context of 2516 1836 wiacmfgr.exe 119 PID 2996 set thread context of 1620 2996 wiacmfgr.exe 121 PID 2376 set thread context of 1936 2376 wiacmfgr.exe 123 PID 2740 set thread context of 2864 2740 wiacmfgr.exe 125 PID 1152 set thread context of 2604 1152 wiacmfgr.exe 127 PID 2324 set thread context of 344 2324 wiacmfgr.exe 129 PID 2904 set thread context of 2416 2904 wiacmfgr.exe 131 PID 2688 set thread context of 1892 2688 wiacmfgr.exe 133 PID 1884 set thread context of 3056 1884 wiacmfgr.exe 135 PID 1768 set thread context of 2076 1768 wiacmfgr.exe 137 PID 1332 set thread context of 1580 1332 wiacmfgr.exe 139 PID 1552 set thread context of 2368 1552 wiacmfgr.exe 141 PID 2964 set thread context of 2976 2964 wiacmfgr.exe 143 PID 2436 set thread context of 1056 2436 wiacmfgr.exe 145 PID 2156 set thread context of 2512 2156 wiacmfgr.exe 147 PID 2500 set thread context of 2524 2500 wiacmfgr.exe 149 PID 756 set thread context of 2992 756 wiacmfgr.exe 151 PID 1016 set thread context of 2124 1016 wiacmfgr.exe 153 PID 2224 set thread context of 2740 2224 wiacmfgr.exe 155 PID 1968 set thread context of 1152 1968 wiacmfgr.exe 157 -
resource yara_rule behavioral1/memory/1796-0-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1796-6-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1796-7-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1796-2-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1796-20-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2640-27-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2640-28-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2640-33-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2548-40-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2548-41-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2548-39-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2548-48-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/620-54-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/620-55-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/620-59-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1312-73-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2820-86-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2860-100-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/472-113-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2744-118-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2744-127-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2280-135-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2280-142-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1724-150-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1724-156-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/680-169-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2064-178-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2064-184-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2032-190-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2032-201-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2792-211-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2256-217-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2256-221-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2100-230-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2128-239-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1472-248-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1344-257-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/3012-259-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/3012-267-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2932-270-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2932-277-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2092-286-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/444-295-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/692-304-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1732-313-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/376-322-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2296-331-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2752-340-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1220-349-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/3000-358-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1804-367-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2132-376-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2712-385-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2832-394-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2016-403-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2228-412-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1984-421-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2088-430-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/752-439-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1736-448-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2984-457-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/1680-466-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2428-475-0x0000000000400000-0x0000000000463000-memory.dmp upx behavioral1/memory/2516-484-0x0000000000400000-0x0000000000463000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wiacmfgr.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 2640 wiacmfgr.exe 2548 wiacmfgr.exe 620 wiacmfgr.exe 1312 wiacmfgr.exe 2820 wiacmfgr.exe 2860 wiacmfgr.exe 472 wiacmfgr.exe 2744 wiacmfgr.exe 2280 wiacmfgr.exe 1724 wiacmfgr.exe 680 wiacmfgr.exe 2064 wiacmfgr.exe 2792 wiacmfgr.exe 2256 wiacmfgr.exe 2100 wiacmfgr.exe 2128 wiacmfgr.exe 1472 wiacmfgr.exe 1344 wiacmfgr.exe 3012 wiacmfgr.exe 2932 wiacmfgr.exe 2092 wiacmfgr.exe 444 wiacmfgr.exe 692 wiacmfgr.exe 1732 wiacmfgr.exe 376 wiacmfgr.exe 2296 wiacmfgr.exe 2752 wiacmfgr.exe 1220 wiacmfgr.exe 3000 wiacmfgr.exe 1804 wiacmfgr.exe 2132 wiacmfgr.exe 2712 wiacmfgr.exe 2832 wiacmfgr.exe 2016 wiacmfgr.exe 2228 wiacmfgr.exe 1984 wiacmfgr.exe 2088 wiacmfgr.exe 752 wiacmfgr.exe 1736 wiacmfgr.exe 2984 wiacmfgr.exe 1680 wiacmfgr.exe 2428 wiacmfgr.exe 2516 wiacmfgr.exe 1620 wiacmfgr.exe 1936 wiacmfgr.exe 2864 wiacmfgr.exe 2604 wiacmfgr.exe 344 wiacmfgr.exe 2416 wiacmfgr.exe 1892 wiacmfgr.exe 3056 wiacmfgr.exe 2076 wiacmfgr.exe 1580 wiacmfgr.exe 2368 wiacmfgr.exe 2976 wiacmfgr.exe 1056 wiacmfgr.exe 2512 wiacmfgr.exe 2524 wiacmfgr.exe 2992 wiacmfgr.exe 2124 wiacmfgr.exe 2740 wiacmfgr.exe 1152 wiacmfgr.exe 2272 wiacmfgr.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 2200 wrote to memory of 1796 2200 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 30 PID 1796 wrote to memory of 2924 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2924 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2924 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 31 PID 1796 wrote to memory of 2924 1796 a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe 31 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2924 wrote to memory of 2640 2924 wiacmfgr.exe 32 PID 2640 wrote to memory of 2568 2640 wiacmfgr.exe 33 PID 2640 wrote to memory of 2568 2640 wiacmfgr.exe 33 PID 2640 wrote to memory of 2568 2640 wiacmfgr.exe 33 PID 2640 wrote to memory of 2568 2640 wiacmfgr.exe 33 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2568 wrote to memory of 2548 2568 wiacmfgr.exe 34 PID 2548 wrote to memory of 576 2548 wiacmfgr.exe 35 PID 2548 wrote to memory of 576 2548 wiacmfgr.exe 35 PID 2548 wrote to memory of 576 2548 wiacmfgr.exe 35 PID 2548 wrote to memory of 576 2548 wiacmfgr.exe 35 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 576 wrote to memory of 620 576 wiacmfgr.exe 36 PID 620 wrote to memory of 2220 620 wiacmfgr.exe 37 PID 620 wrote to memory of 2220 620 wiacmfgr.exe 37 PID 620 wrote to memory of 2220 620 wiacmfgr.exe 37 PID 620 wrote to memory of 2220 620 wiacmfgr.exe 37 PID 2220 wrote to memory of 1312 2220 wiacmfgr.exe 38 PID 2220 wrote to memory of 1312 2220 wiacmfgr.exe 38 PID 2220 wrote to memory of 1312 2220 wiacmfgr.exe 38 PID 2220 wrote to memory of 1312 2220 wiacmfgr.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\a28b528c73a2e5e06b5b535db03b9132_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Users\Admin\AppData\Local\Temp\A28B52~1.EXE3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Users\Admin\AppData\Local\Temp\A28B52~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe5⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe7⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:576 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:620 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe9⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1312 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe11⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2820 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe13⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1880 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe15⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2036 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:472 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe17⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2148 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2744 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe19⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2940 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2280 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe21⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2856 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe23⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:680 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe25⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2452 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2064 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe27⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2456 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2032 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe29⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2776 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1644 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2256 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe33⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1052 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2100 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1180 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2152 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1472 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe39⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2340 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1344 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1792 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe43⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2932 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe45⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1984 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2092 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe47⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:800 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:444 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe49⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1300 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:692 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe51⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1736 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1732 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe53⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2968 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:376 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe55⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2444 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe57⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2756 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe59⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2660 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1220 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe61⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2504 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1456 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1804 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe65⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2224 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe66⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2132 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe67⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe68⤵
- Suspicious behavior: EnumeratesProcesses
PID:2712 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe69⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe70⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2832 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe71⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1292 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe72⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe73⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2020 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe74⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2228 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe75⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe76⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe77⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2288 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe78⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe79⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1588 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe80⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:752 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe81⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1708 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe82⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe83⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe84⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2984 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe85⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1056 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe86⤵
- Suspicious behavior: EnumeratesProcesses
PID:1680 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe87⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1072 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe88⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe89⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1836 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe90⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2516 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe91⤵
- Suspicious use of SetThreadContext
PID:2996 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe92⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1620 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe93⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe94⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe95⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2740 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe96⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2864 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe97⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1152 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe98⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe99⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2324 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe100⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:344 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe101⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2904 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe103⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2688 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1892 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe105⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1884 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe106⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe107⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1768 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe108⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe109⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:1332 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe110⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1580 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe111⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1552 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe112⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2368 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe113⤵
- Suspicious use of SetThreadContext
PID:2964 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe114⤵
- Suspicious behavior: EnumeratesProcesses
PID:2976 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe115⤵
- Suspicious use of SetThreadContext
PID:2436 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe116⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe117⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2156 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe118⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2512 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe119⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:2500 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe120⤵
- Suspicious behavior: EnumeratesProcesses
PID:2524 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe121⤵
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
PID:756 -
C:\Windows\SysWOW64\wiacmfgr.exe"C:\Windows\system32\wiacmfgr.exe" C:\Windows\SysWOW64\wiacmfgr.exe122⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2992
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-