Analysis
-
max time kernel
141s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2024 03:16
Behavioral task
behavioral1
Sample
aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe
Resource
win7-20240903-en
General
-
Target
aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe
-
Size
364KB
-
MD5
aac6660541b72842f5e7902b3bd5de3f
-
SHA1
04c86541e7569a6889311691ed852bfa1933e379
-
SHA256
56d93b29c4db52fe2e336ebeb5377e2c8f72523ea9b527beaef8821c306796d8
-
SHA512
16c6b3433ef398a7fa3e93a5165ff6f9f9b9bffdb238d61c3617303dc25e2376f5eddc37e1c475a0d5740c4e9e3373f85534e03e97957cb22e7d2bb1e20d6e88
-
SSDEEP
6144:k9PjDmRAs7pM3t6nHaCLrob5P9+UeRUq6tyH7xOc6H5c6HcT66vlmr:Of8zbobNeWa
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000b000000023b65-17.dat family_neshta behavioral2/files/0x000a000000023b66-23.dat family_neshta behavioral2/memory/3292-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/244-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/852-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1648-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2864-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4648-58-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4764-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2928-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4784-78-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1764-82-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4536-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0004000000020378-92.dat family_neshta behavioral2/memory/408-96-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020253-110.dat family_neshta behavioral2/files/0x00070000000202b3-98.dat family_neshta behavioral2/files/0x000400000002036a-113.dat family_neshta behavioral2/files/0x00010000000202dc-118.dat family_neshta behavioral2/files/0x000400000002033e-123.dat family_neshta behavioral2/files/0x000400000002036b-117.dat family_neshta behavioral2/files/0x0002000000020342-133.dat family_neshta behavioral2/files/0x000800000002026c-131.dat family_neshta behavioral2/files/0x0001000000021511-146.dat family_neshta behavioral2/files/0x0001000000021510-145.dat family_neshta behavioral2/files/0x000100000002150f-144.dat family_neshta behavioral2/files/0x000100000002260e-143.dat family_neshta behavioral2/files/0x000600000002026a-129.dat family_neshta behavioral2/files/0x0001000000022f6c-157.dat family_neshta behavioral2/files/0x0001000000022f6f-156.dat family_neshta behavioral2/files/0x0001000000022fac-155.dat family_neshta behavioral2/memory/4676-151-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167d0-183.dat family_neshta behavioral2/files/0x000100000001685c-184.dat family_neshta behavioral2/files/0x000100000001680c-186.dat family_neshta behavioral2/files/0x00010000000167d4-185.dat family_neshta behavioral2/files/0x00010000000167ca-193.dat family_neshta behavioral2/files/0x00010000000167f0-192.dat family_neshta behavioral2/memory/4120-179-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/752-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3708-207-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167b7-175.dat family_neshta behavioral2/files/0x0001000000016809-174.dat family_neshta behavioral2/files/0x0001000000022fab-162.dat family_neshta behavioral2/memory/4992-227-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4132-236-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3692-242-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4444-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1044-250-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2868-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/112-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1880-260-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4468-266-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1884-268-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3540-274-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3588-281-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3916-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4872-284-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4300-290-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/432-292-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4976-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4476-305-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3052-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3496-308-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\International\Geo\Nation AAC666~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2996 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 3440 svchost.exe 4320 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 2024 svchost.exe 3292 svchost.com 244 AAC666~1.EXE 852 svchost.com 1648 AAC666~1.EXE 2864 svchost.com 4648 AAC666~1.EXE 4764 svchost.com 2928 AAC666~1.EXE 4784 svchost.com 1764 AAC666~1.EXE 4536 svchost.com 408 AAC666~1.EXE 4676 svchost.com 4120 AAC666~1.EXE 3708 svchost.com 752 AAC666~1.EXE 4992 svchost.com 4132 AAC666~1.EXE 3692 svchost.com 4444 AAC666~1.EXE 1044 svchost.com 2868 AAC666~1.EXE 112 svchost.com 1880 AAC666~1.EXE 4468 svchost.com 1884 AAC666~1.EXE 3540 svchost.com 3588 AAC666~1.EXE 3916 svchost.com 4872 AAC666~1.EXE 4300 svchost.com 432 AAC666~1.EXE 4976 svchost.com 4476 AAC666~1.EXE 3052 svchost.com 3496 AAC666~1.EXE 1600 svchost.com 2852 AAC666~1.EXE 3384 svchost.com 2712 AAC666~1.EXE 4128 svchost.com 2932 AAC666~1.EXE 2876 svchost.com 4548 AAC666~1.EXE 3624 svchost.com 4952 AAC666~1.EXE 3640 svchost.com 1192 AAC666~1.EXE 3984 svchost.com 1432 AAC666~1.EXE 3476 svchost.com 2560 AAC666~1.EXE 2172 svchost.com 3260 AAC666~1.EXE 1300 svchost.com 1052 AAC666~1.EXE 4444 svchost.com 2472 AAC666~1.EXE 5052 svchost.com 5028 AAC666~1.EXE -
Modifies system executable filetype association 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
resource yara_rule behavioral2/memory/1592-2449-0x0000000000400000-0x0000000000499000-memory.dmp upx behavioral2/memory/1592-2451-0x0000000000400000-0x0000000000499000-memory.dmp upx -
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MOZILL~1\MAINTE~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Browser\WCCHRO~1\WCCHRO~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\rmic.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstat.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MI9C33~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\PWAHEL~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe File opened for modification C:\Program Files\Google\Chrome\Application\123.0.6312.123\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\native2ascii.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jjs.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jstack.exe svchost.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com AAC666~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\directx.sys AAC666~1.EXE File opened for modification C:\Windows\svchost.com svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2160 1592 WerFault.exe 698 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AAC666~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings AAC666~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1928 wrote to memory of 2996 1928 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 83 PID 1928 wrote to memory of 2996 1928 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 83 PID 1928 wrote to memory of 2996 1928 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 83 PID 2996 wrote to memory of 3440 2996 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 84 PID 2996 wrote to memory of 3440 2996 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 84 PID 2996 wrote to memory of 3440 2996 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 84 PID 3440 wrote to memory of 4320 3440 svchost.exe 85 PID 3440 wrote to memory of 4320 3440 svchost.exe 85 PID 3440 wrote to memory of 4320 3440 svchost.exe 85 PID 4320 wrote to memory of 3292 4320 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 87 PID 4320 wrote to memory of 3292 4320 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 87 PID 4320 wrote to memory of 3292 4320 aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe 87 PID 3292 wrote to memory of 244 3292 svchost.com 88 PID 3292 wrote to memory of 244 3292 svchost.com 88 PID 3292 wrote to memory of 244 3292 svchost.com 88 PID 244 wrote to memory of 852 244 AAC666~1.EXE 89 PID 244 wrote to memory of 852 244 AAC666~1.EXE 89 PID 244 wrote to memory of 852 244 AAC666~1.EXE 89 PID 852 wrote to memory of 1648 852 svchost.com 90 PID 852 wrote to memory of 1648 852 svchost.com 90 PID 852 wrote to memory of 1648 852 svchost.com 90 PID 1648 wrote to memory of 2864 1648 AAC666~1.EXE 91 PID 1648 wrote to memory of 2864 1648 AAC666~1.EXE 91 PID 1648 wrote to memory of 2864 1648 AAC666~1.EXE 91 PID 2864 wrote to memory of 4648 2864 svchost.com 92 PID 2864 wrote to memory of 4648 2864 svchost.com 92 PID 2864 wrote to memory of 4648 2864 svchost.com 92 PID 4648 wrote to memory of 4764 4648 AAC666~1.EXE 93 PID 4648 wrote to memory of 4764 4648 AAC666~1.EXE 93 PID 4648 wrote to memory of 4764 4648 AAC666~1.EXE 93 PID 4764 wrote to memory of 2928 4764 svchost.com 94 PID 4764 wrote to memory of 2928 4764 svchost.com 94 PID 4764 wrote to memory of 2928 4764 svchost.com 94 PID 2928 wrote to memory of 4784 2928 AAC666~1.EXE 95 PID 2928 wrote to memory of 4784 2928 AAC666~1.EXE 95 PID 2928 wrote to memory of 4784 2928 AAC666~1.EXE 95 PID 4784 wrote to memory of 1764 4784 svchost.com 96 PID 4784 wrote to memory of 1764 4784 svchost.com 96 PID 4784 wrote to memory of 1764 4784 svchost.com 96 PID 1764 wrote to memory of 4536 1764 AAC666~1.EXE 97 PID 1764 wrote to memory of 4536 1764 AAC666~1.EXE 97 PID 1764 wrote to memory of 4536 1764 AAC666~1.EXE 97 PID 4536 wrote to memory of 408 4536 svchost.com 98 PID 4536 wrote to memory of 408 4536 svchost.com 98 PID 4536 wrote to memory of 408 4536 svchost.com 98 PID 408 wrote to memory of 4676 408 AAC666~1.EXE 99 PID 408 wrote to memory of 4676 408 AAC666~1.EXE 99 PID 408 wrote to memory of 4676 408 AAC666~1.EXE 99 PID 4676 wrote to memory of 4120 4676 svchost.com 100 PID 4676 wrote to memory of 4120 4676 svchost.com 100 PID 4676 wrote to memory of 4120 4676 svchost.com 100 PID 4120 wrote to memory of 3708 4120 AAC666~1.EXE 101 PID 4120 wrote to memory of 3708 4120 AAC666~1.EXE 101 PID 4120 wrote to memory of 3708 4120 AAC666~1.EXE 101 PID 3708 wrote to memory of 752 3708 svchost.com 102 PID 3708 wrote to memory of 752 3708 svchost.com 102 PID 3708 wrote to memory of 752 3708 svchost.com 102 PID 752 wrote to memory of 4992 752 AAC666~1.EXE 177 PID 752 wrote to memory of 4992 752 AAC666~1.EXE 177 PID 752 wrote to memory of 4992 752 AAC666~1.EXE 177 PID 4992 wrote to memory of 4132 4992 svchost.com 104 PID 4992 wrote to memory of 4132 4992 svchost.com 104 PID 4992 wrote to memory of 4132 4992 svchost.com 104 PID 4132 wrote to memory of 3692 4132 AAC666~1.EXE 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\3582-490\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\3582-490\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\aac6660541b72842f5e7902b3bd5de3f_JaffaCakes118.exe"4⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE6⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:244 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE8⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:408 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4120 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"19⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"23⤵
- Executes dropped EXE
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE24⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4444 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"25⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2868 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:112 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE28⤵
- Checks computer location settings
- Executes dropped EXE
PID:1880 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"29⤵
- Executes dropped EXE
PID:4468 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE30⤵
- Executes dropped EXE
PID:1884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE32⤵
- Executes dropped EXE
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"33⤵
- Executes dropped EXE
PID:3916 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE34⤵
- Executes dropped EXE
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE36⤵
- Executes dropped EXE
PID:432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4476 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE40⤵
- Executes dropped EXE
PID:3496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
PID:2852 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"43⤵
- Executes dropped EXE
PID:3384 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE44⤵
- Executes dropped EXE
PID:2712 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4128 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE46⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"47⤵
- Executes dropped EXE
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE48⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"49⤵
- Executes dropped EXE
PID:3624 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE50⤵
- Executes dropped EXE
PID:4952 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"51⤵
- Executes dropped EXE
PID:3640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE52⤵
- Executes dropped EXE
PID:1192 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"53⤵
- Executes dropped EXE
PID:3984 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE54⤵
- Executes dropped EXE
PID:1432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"55⤵
- Executes dropped EXE
PID:3476 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE56⤵
- Executes dropped EXE
- Modifies registry class
PID:2560 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"57⤵
- Executes dropped EXE
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE58⤵
- Executes dropped EXE
PID:3260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"59⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
PID:1052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"61⤵
- Executes dropped EXE
PID:4444 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2472 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"63⤵
- Executes dropped EXE
PID:5052 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"65⤵
- Drops file in Windows directory
PID:540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE66⤵
- Checks computer location settings
- Modifies registry class
PID:3236 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"67⤵PID:528
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE68⤵PID:2368
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"69⤵PID:3588
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE70⤵PID:2292
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"71⤵
- System Location Discovery: System Language Discovery
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE72⤵PID:2976
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"73⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE74⤵PID:2608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"75⤵PID:2412
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE76⤵PID:3040
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"77⤵PID:4876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE78⤵PID:2844
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"79⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE80⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"81⤵PID:4564
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE82⤵PID:744
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE84⤵
- Checks computer location settings
- Drops file in Windows directory
PID:64 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"85⤵PID:3640
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE86⤵PID:3152
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"87⤵PID:2776
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE88⤵PID:3136
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"89⤵PID:4264
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE90⤵PID:1120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"91⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE92⤵
- Checks computer location settings
- Modifies registry class
PID:100 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"93⤵PID:3584
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE94⤵PID:2156
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"95⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE96⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2460 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"97⤵PID:2556
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE98⤵PID:216
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"99⤵PID:4360
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE100⤵PID:1980
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"101⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE102⤵
- Checks computer location settings
PID:3232 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"103⤵PID:4088
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE104⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4872 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"105⤵PID:5032
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE106⤵PID:3172
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"107⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE108⤵PID:2608
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"109⤵PID:2852
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE110⤵
- Checks computer location settings
PID:2264 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"111⤵PID:4128
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE112⤵PID:4860
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"113⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE114⤵
- Modifies registry class
PID:4612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"115⤵PID:4820
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE116⤵PID:4956
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"117⤵PID:3264
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE118⤵
- Checks computer location settings
PID:4240 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"119⤵PID:2992
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE120⤵PID:1584
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE"121⤵PID:3208
-
C:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\AAC666~1.EXE122⤵
- Checks computer location settings
- Modifies registry class
PID:2308
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-