Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
06-12-2024 19:43
Behavioral task
behavioral1
Sample
ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe
-
Size
222KB
-
MD5
ceb1db5017ee32cf49c8a33923a384c4
-
SHA1
c6fe5b4cc1b63c5e9d8d9b612a30022e1f045bf9
-
SHA256
91bdecb602c13e9dd190d3df09d2bd856829b30b70acd9c8e925b6cd33bcb629
-
SHA512
3b743d03b91938f3d5f574f3f39dba259c0bb52abd91997cd53f18a4576149cf69162f8fc7ef3bee66748bd3b1542dbc224477e28fed20b7d461789fa422c736
-
SSDEEP
3072:sr85CZYsbTJx5+AyfCQPikxkyyxO1AIOz1F8StsgdFoaApEzul4jmpjC1Hxr85C:k9asHJx523i3O1AI4zts4CB4aVCj9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x000a000000023b8d-4.dat family_neshta behavioral2/files/0x000a000000023b8e-10.dat family_neshta behavioral2/memory/2248-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1984-20-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4216-28-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3604-32-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/968-40-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3948-51-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3140-52-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3260-56-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4548-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2020-75-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2400-76-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4508-80-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3228-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020240-97.dat family_neshta behavioral2/files/0x000600000002024c-96.dat family_neshta behavioral2/files/0x0006000000020244-94.dat family_neshta behavioral2/memory/896-122-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000202bd-109.dat family_neshta behavioral2/files/0x0004000000020376-108.dat family_neshta behavioral2/files/0x00010000000202d5-107.dat family_neshta behavioral2/files/0x0004000000020364-105.dat family_neshta behavioral2/memory/536-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3612-134-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000100000002155e-141.dat family_neshta behavioral2/files/0x0001000000021506-144.dat family_neshta behavioral2/files/0x0001000000021508-148.dat family_neshta behavioral2/files/0x0001000000022f8b-177.dat family_neshta behavioral2/files/0x00010000000167d2-189.dat family_neshta behavioral2/memory/1044-196-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x00010000000167d4-188.dat family_neshta behavioral2/files/0x00010000000167b9-187.dat family_neshta behavioral2/files/0x0001000000022f8d-168.dat family_neshta behavioral2/files/0x0001000000022f4c-167.dat family_neshta behavioral2/files/0x0001000000022f4f-166.dat family_neshta behavioral2/files/0x0001000000022f8c-165.dat family_neshta behavioral2/files/0x0001000000022f4a-164.dat family_neshta behavioral2/files/0x0001000000022f4e-163.dat family_neshta behavioral2/memory/2024-156-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000021507-153.dat family_neshta behavioral2/memory/1060-211-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4676-219-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1848-223-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2992-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4760-245-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4716-247-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4304-255-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4496-257-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1612-265-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3960-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5024-273-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4448-286-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2284-287-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5036-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3860-295-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/116-297-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4408-303-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4548-310-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2920-311-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2400-318-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4152-319-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2464-321-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2668-327-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\International\Geo\Nation CEB1DB~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 2956 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 2248 svchost.com 1984 CEB1DB~1.EXE 4216 svchost.com 3604 CEB1DB~1.EXE 968 svchost.com 3948 CEB1DB~1.EXE 3140 svchost.com 3260 CEB1DB~1.EXE 4548 svchost.com 2020 CEB1DB~1.EXE 2400 svchost.com 4508 CEB1DB~1.EXE 3228 svchost.com 896 CEB1DB~1.EXE 536 svchost.com 3612 CEB1DB~1.EXE 2024 svchost.com 1044 CEB1DB~1.EXE 1060 svchost.com 4676 CEB1DB~1.EXE 1848 svchost.com 2992 CEB1DB~1.EXE 4760 svchost.com 4716 CEB1DB~1.EXE 4304 svchost.com 4496 CEB1DB~1.EXE 1612 svchost.com 3960 CEB1DB~1.EXE 5024 svchost.com 4448 CEB1DB~1.EXE 2284 svchost.com 5036 CEB1DB~1.EXE 3860 svchost.com 116 CEB1DB~1.EXE 4408 svchost.com 4548 CEB1DB~1.EXE 2920 svchost.com 2400 CEB1DB~1.EXE 4152 svchost.com 2464 CEB1DB~1.EXE 2668 svchost.com 1184 CEB1DB~1.EXE 4420 svchost.com 5040 CEB1DB~1.EXE 4432 svchost.com 1388 CEB1DB~1.EXE 4584 svchost.com 4176 CEB1DB~1.EXE 2548 svchost.com 1204 CEB1DB~1.EXE 2864 svchost.com 3944 CEB1DB~1.EXE 4684 svchost.com 3588 CEB1DB~1.EXE 3932 svchost.com 1492 CEB1DB~1.EXE 4472 svchost.com 3332 CEB1DB~1.EXE 1576 svchost.com 2228 CEB1DB~1.EXE 4332 svchost.com 4380 CEB1DB~1.EXE 4004 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" CEB1DB~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~3.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\ARM\1.0\AdobeARM.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF5AF~1\WINDOW~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{57A73~1\VC_RED~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~3\Adobe\Setup\{AC76B~1\setup.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ExtExport.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmplayer.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\java.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~3\MICROS~1\CLICKT~1\{9AC08~1\INTEGR~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{63880~1\WINDOW~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOBD5D~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe CEB1DB~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~4.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroCEF\RdrCEF.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~4.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaws.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\BHO\IE_TO_~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wab.exe ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys CEB1DB~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com CEB1DB~1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language CEB1DB~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE Key created \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000_Classes\Local Settings CEB1DB~1.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2956 2244 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2956 2244 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 82 PID 2244 wrote to memory of 2956 2244 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 82 PID 2956 wrote to memory of 2248 2956 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 83 PID 2956 wrote to memory of 2248 2956 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 83 PID 2956 wrote to memory of 2248 2956 ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe 83 PID 2248 wrote to memory of 1984 2248 svchost.com 84 PID 2248 wrote to memory of 1984 2248 svchost.com 84 PID 2248 wrote to memory of 1984 2248 svchost.com 84 PID 1984 wrote to memory of 4216 1984 CEB1DB~1.EXE 85 PID 1984 wrote to memory of 4216 1984 CEB1DB~1.EXE 85 PID 1984 wrote to memory of 4216 1984 CEB1DB~1.EXE 85 PID 4216 wrote to memory of 3604 4216 svchost.com 86 PID 4216 wrote to memory of 3604 4216 svchost.com 86 PID 4216 wrote to memory of 3604 4216 svchost.com 86 PID 3604 wrote to memory of 968 3604 CEB1DB~1.EXE 87 PID 3604 wrote to memory of 968 3604 CEB1DB~1.EXE 87 PID 3604 wrote to memory of 968 3604 CEB1DB~1.EXE 87 PID 968 wrote to memory of 3948 968 svchost.com 88 PID 968 wrote to memory of 3948 968 svchost.com 88 PID 968 wrote to memory of 3948 968 svchost.com 88 PID 3948 wrote to memory of 3140 3948 CEB1DB~1.EXE 89 PID 3948 wrote to memory of 3140 3948 CEB1DB~1.EXE 89 PID 3948 wrote to memory of 3140 3948 CEB1DB~1.EXE 89 PID 3140 wrote to memory of 3260 3140 svchost.com 90 PID 3140 wrote to memory of 3260 3140 svchost.com 90 PID 3140 wrote to memory of 3260 3140 svchost.com 90 PID 3260 wrote to memory of 4548 3260 CEB1DB~1.EXE 118 PID 3260 wrote to memory of 4548 3260 CEB1DB~1.EXE 118 PID 3260 wrote to memory of 4548 3260 CEB1DB~1.EXE 118 PID 4548 wrote to memory of 2020 4548 svchost.com 92 PID 4548 wrote to memory of 2020 4548 svchost.com 92 PID 4548 wrote to memory of 2020 4548 svchost.com 92 PID 2020 wrote to memory of 2400 2020 CEB1DB~1.EXE 120 PID 2020 wrote to memory of 2400 2020 CEB1DB~1.EXE 120 PID 2020 wrote to memory of 2400 2020 CEB1DB~1.EXE 120 PID 2400 wrote to memory of 4508 2400 svchost.com 94 PID 2400 wrote to memory of 4508 2400 svchost.com 94 PID 2400 wrote to memory of 4508 2400 svchost.com 94 PID 4508 wrote to memory of 3228 4508 CEB1DB~1.EXE 95 PID 4508 wrote to memory of 3228 4508 CEB1DB~1.EXE 95 PID 4508 wrote to memory of 3228 4508 CEB1DB~1.EXE 95 PID 3228 wrote to memory of 896 3228 svchost.com 96 PID 3228 wrote to memory of 896 3228 svchost.com 96 PID 3228 wrote to memory of 896 3228 svchost.com 96 PID 896 wrote to memory of 536 896 CEB1DB~1.EXE 97 PID 896 wrote to memory of 536 896 CEB1DB~1.EXE 97 PID 896 wrote to memory of 536 896 CEB1DB~1.EXE 97 PID 536 wrote to memory of 3612 536 svchost.com 98 PID 536 wrote to memory of 3612 536 svchost.com 98 PID 536 wrote to memory of 3612 536 svchost.com 98 PID 3612 wrote to memory of 2024 3612 CEB1DB~1.EXE 99 PID 3612 wrote to memory of 2024 3612 CEB1DB~1.EXE 99 PID 3612 wrote to memory of 2024 3612 CEB1DB~1.EXE 99 PID 2024 wrote to memory of 1044 2024 svchost.com 100 PID 2024 wrote to memory of 1044 2024 svchost.com 100 PID 2024 wrote to memory of 1044 2024 svchost.com 100 PID 1044 wrote to memory of 1060 1044 CEB1DB~1.EXE 101 PID 1044 wrote to memory of 1060 1044 CEB1DB~1.EXE 101 PID 1044 wrote to memory of 1060 1044 CEB1DB~1.EXE 101 PID 1060 wrote to memory of 4676 1060 svchost.com 102 PID 1060 wrote to memory of 4676 1060 svchost.com 102 PID 1060 wrote to memory of 4676 1060 svchost.com 102 PID 4676 wrote to memory of 1848 4676 CEB1DB~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\3582-490\ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\ceb1db5017ee32cf49c8a33923a384c4_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE8⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE10⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE12⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2020 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2400 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE14⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4508 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE16⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:896 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"17⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:536 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3612 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:4676 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE24⤵
- Executes dropped EXE
- Modifies registry class
PID:2992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"25⤵
- Executes dropped EXE
PID:4760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE26⤵
- Executes dropped EXE
PID:4716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"27⤵
- Executes dropped EXE
PID:4304 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4496 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"29⤵
- Executes dropped EXE
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE30⤵
- Executes dropped EXE
- Modifies registry class
PID:3960 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"31⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:5024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:4448 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5036 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"35⤵
- Executes dropped EXE
PID:3860 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE36⤵
- Checks computer location settings
- Executes dropped EXE
PID:116 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"37⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE38⤵
- Executes dropped EXE
PID:4548 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE40⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:2400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"41⤵
- Executes dropped EXE
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE42⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2464 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"43⤵
- Executes dropped EXE
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE44⤵
- Checks computer location settings
- Executes dropped EXE
PID:1184 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"45⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:4420 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"47⤵
- Executes dropped EXE
PID:4432 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:1388 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"49⤵
- Executes dropped EXE
PID:4584 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE50⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"51⤵
- Executes dropped EXE
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE52⤵
- Executes dropped EXE
PID:1204 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"53⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE54⤵
- Executes dropped EXE
PID:3944 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"55⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4684 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE56⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"57⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3932 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE58⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:1492 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"59⤵
- Executes dropped EXE
PID:4472 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE60⤵
- Checks computer location settings
- Executes dropped EXE
- Modifies registry class
PID:3332 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"61⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE62⤵
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:2228 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"63⤵
- Executes dropped EXE
PID:4332 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE64⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4380 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"65⤵
- Executes dropped EXE
PID:4004 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE66⤵PID:1876
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"67⤵
- Drops file in Windows directory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE68⤵
- Checks computer location settings
- Modifies registry class
PID:884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"69⤵
- Drops file in Windows directory
PID:4520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE70⤵
- Modifies registry class
PID:968 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"71⤵PID:1028
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE72⤵
- System Location Discovery: System Language Discovery
PID:4856 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"73⤵
- Drops file in Windows directory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE74⤵
- Drops file in Windows directory
- Modifies registry class
PID:3260 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"75⤵
- Drops file in Windows directory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE76⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"77⤵
- Drops file in Windows directory
PID:880 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE78⤵PID:1916
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"79⤵PID:840
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE80⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"81⤵PID:4316
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE82⤵
- Modifies registry class
PID:2668 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"83⤵
- System Location Discovery: System Language Discovery
PID:3692 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE84⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4420 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"85⤵
- Drops file in Windows directory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE86⤵
- Drops file in Windows directory
PID:4432 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"87⤵PID:3516
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE88⤵
- Modifies registry class
PID:4584 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"89⤵
- Drops file in Windows directory
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE90⤵
- Modifies registry class
PID:4416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"91⤵PID:2940
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE92⤵PID:4032
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"93⤵
- System Location Discovery: System Language Discovery
PID:700 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE94⤵
- Checks computer location settings
- Modifies registry class
PID:2220 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"95⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE96⤵
- Checks computer location settings
PID:4172 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:3580 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE98⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:1992 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"99⤵PID:4336
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE100⤵
- Checks computer location settings
- Drops file in Windows directory
PID:4212 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"101⤵
- System Location Discovery: System Language Discovery
PID:4660 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE102⤵
- Modifies registry class
PID:4716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"103⤵
- Drops file in Windows directory
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE104⤵PID:3528
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"105⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3620 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE106⤵
- Checks computer location settings
PID:4848 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"107⤵
- Drops file in Windows directory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE108⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"109⤵PID:3520
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE110⤵
- Drops file in Windows directory
- Modifies registry class
PID:4536 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"111⤵PID:1756
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE112⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"113⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE114⤵
- Checks computer location settings
- Drops file in Windows directory
PID:2988 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"115⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE116⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:2400 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"117⤵PID:4060
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE118⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"119⤵
- System Location Discovery: System Language Discovery
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE120⤵
- Checks computer location settings
- Modifies registry class
PID:980 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE"121⤵PID:4016
-
C:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\CEB1DB~1.EXE122⤵
- Checks computer location settings
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3940
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-