Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
28/11/2024, 17:26
Behavioral task
behavioral1
Sample
ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe
-
Size
68KB
-
MD5
ad0f9009d880d4326ccbe286aa53a36d
-
SHA1
6c96b50e3e346ff5d09dfd27d8def6a4f4a2a018
-
SHA256
d2959b83ce5e903efbca788536d024a3de86c688c6ca73f4429e6c4cd891a5b1
-
SHA512
38b6fa65a0ba7017ddd0fc4688d9807adc75226122ddc6cb6f7edfd50b492ffac2fbe10ae3c50b0f815b970da9a9bd96b999f9465160728cc417ce9d78bef5bc
-
SSDEEP
1536:BqqYFQ0CymOK5qsmQHgNuDvCKRJecKuU9J5eQr/Yxk:kFRCLOdLNeCeJBK19JfrAxk
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 33 IoCs
resource yara_rule behavioral2/files/0x000b000000023cb6-2.dat modiloader_stage2 behavioral2/memory/1876-84-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3164-95-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/1056-97-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/244-96-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/436-94-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3076-93-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/1220-92-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/1740-91-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4432-90-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/2276-89-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3124-88-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3948-87-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3224-86-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3756-85-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3692-82-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3108-81-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3936-72-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/1844-79-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/1160-78-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4940-77-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3908-76-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4172-75-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4540-74-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4308-73-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/2664-70-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/2912-68-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/2300-67-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/4132-66-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3352-83-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/3096-80-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/1848-71-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 behavioral2/memory/2128-69-0x0000000000400000-0x0000000000418000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2300 grtosts.exe 2912 grtosts.exe 2128 grtosts.exe 2664 grtosts.exe 1848 grtosts.exe 3936 grtosts.exe 4308 grtosts.exe 4540 grtosts.exe 4172 grtosts.exe 3908 grtosts.exe 4940 grtosts.exe 1160 grtosts.exe 1844 grtosts.exe 3096 grtosts.exe 3108 grtosts.exe 3692 grtosts.exe 3352 grtosts.exe 1876 grtosts.exe 3756 grtosts.exe 3224 grtosts.exe 3948 grtosts.exe 3124 grtosts.exe 2276 grtosts.exe 4432 grtosts.exe 1740 grtosts.exe 1220 grtosts.exe 3076 grtosts.exe 436 grtosts.exe 3164 grtosts.exe 244 grtosts.exe 1056 grtosts.exe 3284 grtosts.exe 8 grtosts.exe 4196 grtosts.exe 4576 grtosts.exe 432 grtosts.exe 3312 grtosts.exe 3852 grtosts.exe 4032 grtosts.exe 2716 grtosts.exe 2388 grtosts.exe 184 grtosts.exe 3064 grtosts.exe 1980 grtosts.exe 1892 grtosts.exe 2200 grtosts.exe 3976 grtosts.exe 2472 grtosts.exe 2588 grtosts.exe 3196 grtosts.exe 3236 grtosts.exe 4456 grtosts.exe 3828 grtosts.exe 2908 grtosts.exe 3988 grtosts.exe 1688 grtosts.exe 2932 grtosts.exe 884 grtosts.exe 3640 grtosts.exe 348 grtosts.exe 1304 grtosts.exe 1560 grtosts.exe 2888 grtosts.exe 1456 grtosts.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe grtosts.exe File created C:\Windows\SysWOW64\grtosts.exe Process not Found -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language grtosts.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4132 wrote to memory of 2300 4132 ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe 83 PID 4132 wrote to memory of 2300 4132 ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe 83 PID 4132 wrote to memory of 2300 4132 ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe 83 PID 2300 wrote to memory of 2912 2300 grtosts.exe 84 PID 2300 wrote to memory of 2912 2300 grtosts.exe 84 PID 2300 wrote to memory of 2912 2300 grtosts.exe 84 PID 2912 wrote to memory of 2128 2912 grtosts.exe 85 PID 2912 wrote to memory of 2128 2912 grtosts.exe 85 PID 2912 wrote to memory of 2128 2912 grtosts.exe 85 PID 2128 wrote to memory of 2664 2128 grtosts.exe 86 PID 2128 wrote to memory of 2664 2128 grtosts.exe 86 PID 2128 wrote to memory of 2664 2128 grtosts.exe 86 PID 2664 wrote to memory of 1848 2664 grtosts.exe 87 PID 2664 wrote to memory of 1848 2664 grtosts.exe 87 PID 2664 wrote to memory of 1848 2664 grtosts.exe 87 PID 1848 wrote to memory of 3936 1848 grtosts.exe 88 PID 1848 wrote to memory of 3936 1848 grtosts.exe 88 PID 1848 wrote to memory of 3936 1848 grtosts.exe 88 PID 3936 wrote to memory of 4308 3936 grtosts.exe 89 PID 3936 wrote to memory of 4308 3936 grtosts.exe 89 PID 3936 wrote to memory of 4308 3936 grtosts.exe 89 PID 4308 wrote to memory of 4540 4308 grtosts.exe 90 PID 4308 wrote to memory of 4540 4308 grtosts.exe 90 PID 4308 wrote to memory of 4540 4308 grtosts.exe 90 PID 4540 wrote to memory of 4172 4540 grtosts.exe 91 PID 4540 wrote to memory of 4172 4540 grtosts.exe 91 PID 4540 wrote to memory of 4172 4540 grtosts.exe 91 PID 4172 wrote to memory of 3908 4172 grtosts.exe 92 PID 4172 wrote to memory of 3908 4172 grtosts.exe 92 PID 4172 wrote to memory of 3908 4172 grtosts.exe 92 PID 3908 wrote to memory of 4940 3908 grtosts.exe 93 PID 3908 wrote to memory of 4940 3908 grtosts.exe 93 PID 3908 wrote to memory of 4940 3908 grtosts.exe 93 PID 4940 wrote to memory of 1160 4940 grtosts.exe 94 PID 4940 wrote to memory of 1160 4940 grtosts.exe 94 PID 4940 wrote to memory of 1160 4940 grtosts.exe 94 PID 1160 wrote to memory of 1844 1160 grtosts.exe 95 PID 1160 wrote to memory of 1844 1160 grtosts.exe 95 PID 1160 wrote to memory of 1844 1160 grtosts.exe 95 PID 1844 wrote to memory of 3096 1844 grtosts.exe 96 PID 1844 wrote to memory of 3096 1844 grtosts.exe 96 PID 1844 wrote to memory of 3096 1844 grtosts.exe 96 PID 3096 wrote to memory of 3108 3096 grtosts.exe 97 PID 3096 wrote to memory of 3108 3096 grtosts.exe 97 PID 3096 wrote to memory of 3108 3096 grtosts.exe 97 PID 3108 wrote to memory of 3692 3108 grtosts.exe 98 PID 3108 wrote to memory of 3692 3108 grtosts.exe 98 PID 3108 wrote to memory of 3692 3108 grtosts.exe 98 PID 3692 wrote to memory of 3352 3692 grtosts.exe 99 PID 3692 wrote to memory of 3352 3692 grtosts.exe 99 PID 3692 wrote to memory of 3352 3692 grtosts.exe 99 PID 3352 wrote to memory of 1876 3352 grtosts.exe 100 PID 3352 wrote to memory of 1876 3352 grtosts.exe 100 PID 3352 wrote to memory of 1876 3352 grtosts.exe 100 PID 1876 wrote to memory of 3756 1876 grtosts.exe 101 PID 1876 wrote to memory of 3756 1876 grtosts.exe 101 PID 1876 wrote to memory of 3756 1876 grtosts.exe 101 PID 3756 wrote to memory of 3224 3756 grtosts.exe 102 PID 3756 wrote to memory of 3224 3756 grtosts.exe 102 PID 3756 wrote to memory of 3224 3756 grtosts.exe 102 PID 3224 wrote to memory of 3948 3224 grtosts.exe 103 PID 3224 wrote to memory of 3948 3224 grtosts.exe 103 PID 3224 wrote to memory of 3948 3224 grtosts.exe 103 PID 3948 wrote to memory of 3124 3948 grtosts.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ad0f9009d880d4326ccbe286aa53a36d_JaffaCakes118.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4132 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3936 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4308 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3908 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3108 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3692 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3352 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1876 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe23⤵
- Executes dropped EXE
PID:3124 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe24⤵
- Executes dropped EXE
PID:2276 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe25⤵
- Executes dropped EXE
PID:4432 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe26⤵
- Executes dropped EXE
PID:1740 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe27⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1220 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe28⤵
- Executes dropped EXE
PID:3076 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe29⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:436 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe30⤵
- Executes dropped EXE
PID:3164 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe31⤵
- Executes dropped EXE
PID:244 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1056 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe33⤵
- Executes dropped EXE
PID:3284 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe34⤵
- Executes dropped EXE
PID:8 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe35⤵
- Executes dropped EXE
PID:4196 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe36⤵
- Executes dropped EXE
PID:4576 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe37⤵
- Executes dropped EXE
PID:432 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe38⤵
- Executes dropped EXE
PID:3312 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe39⤵
- Executes dropped EXE
PID:3852 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe40⤵
- Executes dropped EXE
PID:4032 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe41⤵
- Executes dropped EXE
PID:2716 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe42⤵
- Executes dropped EXE
PID:2388 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe43⤵
- Executes dropped EXE
PID:184 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe44⤵
- Executes dropped EXE
PID:3064 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe45⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1980 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe46⤵
- Executes dropped EXE
PID:1892 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe47⤵
- Executes dropped EXE
PID:2200 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe48⤵
- Executes dropped EXE
PID:3976 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe49⤵
- Executes dropped EXE
PID:2472 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe50⤵
- Executes dropped EXE
PID:2588 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe51⤵
- Executes dropped EXE
PID:3196 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe52⤵
- Executes dropped EXE
PID:3236 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe53⤵
- Executes dropped EXE
PID:4456 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe54⤵
- Executes dropped EXE
PID:3828 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe55⤵
- Executes dropped EXE
PID:2908 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe56⤵
- Executes dropped EXE
PID:3988 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe57⤵
- Executes dropped EXE
PID:1688 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe58⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe59⤵
- Executes dropped EXE
PID:884 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe60⤵
- Executes dropped EXE
PID:3640 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe61⤵
- Executes dropped EXE
PID:348 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe62⤵
- Executes dropped EXE
PID:1304 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe63⤵
- Executes dropped EXE
PID:1560 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe64⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2888 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1456 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe66⤵PID:376
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe67⤵PID:1344
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe68⤵PID:1912
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe69⤵PID:1536
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe70⤵PID:2740
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe71⤵PID:4192
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe72⤵PID:3004
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe73⤵PID:3128
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe74⤵PID:1752
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe75⤵
- Drops file in System32 directory
PID:556 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe76⤵PID:4488
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe77⤵PID:3376
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe78⤵PID:2028
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe79⤵PID:3320
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe80⤵PID:4304
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe81⤵PID:2408
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe82⤵PID:372
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe83⤵PID:5104
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe84⤵PID:1432
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe85⤵PID:4116
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe86⤵PID:2864
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe87⤵PID:4056
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe88⤵PID:3188
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe89⤵PID:1916
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe90⤵PID:2848
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe91⤵PID:800
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe92⤵PID:3448
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe93⤵
- System Location Discovery: System Language Discovery
PID:4360 -
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe94⤵PID:4652
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe95⤵PID:1664
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe96⤵PID:2464
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe97⤵PID:804
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe98⤵PID:2228
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe99⤵PID:3904
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe100⤵PID:1860
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe101⤵PID:3104
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe102⤵PID:3092
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe103⤵PID:4084
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe104⤵PID:4648
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe105⤵PID:4936
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe106⤵PID:1444
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe107⤵PID:4184
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe108⤵PID:4484
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe109⤵PID:4452
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe110⤵PID:4516
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe111⤵PID:4980
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe112⤵PID:4384
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe113⤵PID:2404
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe114⤵PID:1004
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe115⤵PID:2612
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe116⤵PID:5128
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe117⤵PID:5148
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe118⤵PID:5164
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe119⤵PID:5180
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe120⤵PID:5196
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe121⤵PID:5216
-
C:\Windows\SysWOW64\grtosts.exeC:\Windows\system32\grtosts.exe122⤵PID:5260
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-