Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
08-12-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe
-
Size
110KB
-
MD5
d594c186f9660bcf2bc3fdb127dbdf7c
-
SHA1
140ad950bc94e325fe58b99cbe3c2c1bed3e11d7
-
SHA256
e12682a3a1449409aacfa114db8609a44266c47a507ef833ad5d0397922c6fca
-
SHA512
d2daf8a0ce0b51089bbdca62a17fc85a537c1ba1be1d08f9b19e2d6b0d2f6c362b7c4fa08b8fbdbdc61a7af89f76cceedfd7e7b0095d6f8ffaa87c4097f78353
-
SSDEEP
3072:h79iUoxnqKHgG6v0Jg5fqipkw2udJupRmSB3dg1YthAPeYGa:hmx+/vgtxpRDB3diYUPeN
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
resource yara_rule behavioral2/memory/2884-21-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1064-23-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/404-25-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/460-27-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1980-29-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1060-31-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1360-33-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4680-35-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1784-37-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3184-39-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/5028-41-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1728-43-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1016-45-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4252-47-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3528-49-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2612-51-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/5048-53-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/324-55-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3780-57-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3900-59-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3332-61-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3812-63-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4408-65-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3660-67-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4736-69-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4668-71-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4972-73-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/512-75-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3772-77-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/5008-79-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1252-81-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2932-83-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1772-85-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4500-88-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2648-90-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1260-87-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1928-92-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2008-93-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1672-95-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4912-96-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1476-98-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2396-100-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2736-102-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4464-105-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/5100-104-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4940-107-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/5052-109-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/864-116-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2620-114-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2928-112-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1800-110-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4748-119-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4088-121-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2012-124-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4896-126-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4728-127-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4108-128-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/4132-129-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2552-130-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/996-131-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/1504-132-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/3748-133-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2892-134-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 behavioral2/memory/2484-135-0x0000000000400000-0x000000000041C000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2884 ztchao.exe 1064 explore.exe 404 explore.exe 460 explore.exe 1980 explore.exe 1060 explore.exe 1360 explore.exe 4680 explore.exe 1784 explore.exe 3184 explore.exe 5028 explore.exe 1728 explore.exe 1016 explore.exe 4252 explore.exe 3528 explore.exe 2612 explore.exe 5048 explore.exe 324 explore.exe 3780 explore.exe 3900 explore.exe 3332 explore.exe 3812 explore.exe 4408 explore.exe 3660 explore.exe 4736 explore.exe 4668 explore.exe 4972 explore.exe 512 explore.exe 3772 explore.exe 5008 explore.exe 1252 explore.exe 2932 explore.exe 1772 explore.exe 1260 explore.exe 2648 explore.exe 1928 explore.exe 1672 explore.exe 1476 explore.exe 2396 explore.exe 2736 explore.exe 4464 explore.exe 4940 explore.exe 5052 explore.exe 4500 explore.exe 2620 explore.exe 2008 explore.exe 4912 explore.exe 4748 explore.exe 4088 explore.exe 5100 explore.exe 2012 explore.exe 4896 explore.exe 1800 explore.exe 2928 explore.exe 4728 explore.exe 864 explore.exe 4108 explore.exe 4132 explore.exe 2552 explore.exe 996 explore.exe 1504 explore.exe 3748 explore.exe 2892 explore.exe 2484 explore.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\internst.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe Process not Found File created C:\Windows\SysWOW64\explore.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\internst.exe Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\explore.exe Process not Found File created C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File created C:\Windows\SysWOW64\internst.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe Process not Found File created C:\Windows\SysWOW64\internst.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe Process not Found File created C:\Windows\SysWOW64\internst.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat Process not Found File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe explore.exe File created C:\Windows\SysWOW64\explore.exe Process not Found File created C:\Windows\SysWOW64\internst.exe Process not Found File created C:\Windows\SysWOW64\internst.exe Process not Found File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe File opened for modification C:\Windows\SysWOW64\$$a.bat explore.exe -
resource yara_rule behavioral2/files/0x0007000000023c86-5.dat upx behavioral2/memory/2884-6-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2884-21-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1064-23-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/404-25-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/460-27-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1980-29-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1060-31-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1360-33-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4680-35-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1784-37-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3184-39-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5028-41-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1728-43-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1016-45-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4252-47-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3528-49-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2612-51-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5048-53-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/324-55-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3780-57-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3900-59-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3332-61-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3812-63-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4408-65-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3660-67-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4736-69-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4668-71-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4972-73-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/512-75-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3772-77-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5008-79-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1252-81-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2932-83-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1772-85-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4500-88-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2648-90-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1260-87-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1928-92-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2008-93-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1672-95-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4912-96-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1476-98-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2396-100-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2736-102-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4464-105-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5100-104-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4940-107-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/5052-109-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/864-116-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2620-114-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2928-112-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1800-110-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4748-119-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4088-121-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2012-124-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4896-126-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4728-127-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4108-128-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/4132-129-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/2552-130-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/996-131-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/1504-132-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3748-133-0x0000000000400000-0x000000000041C000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Process not Found -
Checks SCSI registry key(s) 3 TTPs 6 IoCs
SCSI information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\DISK&VEN_WDC&PROD_WDS100T2B0A\4&215468A5&0&000000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\ConfigFlags Process not Found Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CDROM&VEN_QEMU&PROD_QEMU_DVD-ROM\4&215468A5&0&010000 Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\ConfigFlags Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_WDC&Prod_WDS100T2B0A\4&215468a5&0&000000\HardwareID Process not Found Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\CdRom&Ven_QEMU&Prod_QEMU_DVD-ROM\4&215468a5&0&010000\HardwareID Process not Found -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS Process not Found Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU Process not Found -
Modifies data under HKEY_USERS 18 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\WinTrust\Trust Providers\Software Publishing Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Classes\Local Settings\MuiCache\26\52C64B7E Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root Process not Found Key created \REGISTRY\USER\.DEFAULT\Software Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed Process not Found Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople Process not Found -
Suspicious behavior: LoadsDriver 64 IoCs
pid Process 31028 Process not Found 30984 Process not Found 31328 Process not Found 29960 Process not Found 29920 Process not Found 30560 Process not Found 25496 Process not Found 21724 Process not Found 24648 Process not Found 392 Process not Found 25440 Process not Found 2384 Process not Found 25612 Process not Found 26744 Process not Found 26760 Process not Found 25220 Process not Found 26792 Process not Found 26864 Process not Found 25088 Process not Found 20976 Process not Found 19000 Process not Found 23656 Process not Found 19460 Process not Found 18012 Process not Found 21680 Process not Found 20604 Process not Found 22856 Process not Found 22876 Process not Found 22904 Process not Found 19952 Process not Found 21072 Process not Found 21948 Process not Found 23964 Process not Found 23996 Process not Found 21152 Process not Found 24040 Process not Found 26628 Process not Found 26952 Process not Found 26704 Process not Found 2068 Process not Found 25700 Process not Found 26984 Process not Found 23416 Process not Found 24200 Process not Found 24240 Process not Found 21224 Process not Found 2324 Process not Found 24116 Process not Found 19980 Process not Found 17092 Process not Found 2568 Process not Found 21436 Process not Found 19580 Process not Found 24288 Process not Found 22804 Process not Found 4476 Process not Found 5544 Process not Found 3992 Process not Found 25292 Process not Found 24864 Process not Found 21996 Process not Found 27068 Process not Found 18560 Process not Found 24268 Process not Found -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeCreateGlobalPrivilege 19984 Process not Found Token: SeChangeNotifyPrivilege 19984 Process not Found Token: 33 19984 Process not Found Token: SeIncBasePriorityPrivilege 19984 Process not Found -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1400 wrote to memory of 2884 1400 d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe 83 PID 1400 wrote to memory of 2884 1400 d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe 83 PID 1400 wrote to memory of 2884 1400 d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe 83 PID 2884 wrote to memory of 1064 2884 ztchao.exe 84 PID 2884 wrote to memory of 1064 2884 ztchao.exe 84 PID 2884 wrote to memory of 1064 2884 ztchao.exe 84 PID 1064 wrote to memory of 404 1064 explore.exe 85 PID 1064 wrote to memory of 404 1064 explore.exe 85 PID 1064 wrote to memory of 404 1064 explore.exe 85 PID 404 wrote to memory of 460 404 explore.exe 86 PID 404 wrote to memory of 460 404 explore.exe 86 PID 404 wrote to memory of 460 404 explore.exe 86 PID 460 wrote to memory of 1980 460 explore.exe 87 PID 460 wrote to memory of 1980 460 explore.exe 87 PID 460 wrote to memory of 1980 460 explore.exe 87 PID 1980 wrote to memory of 1060 1980 explore.exe 88 PID 1980 wrote to memory of 1060 1980 explore.exe 88 PID 1980 wrote to memory of 1060 1980 explore.exe 88 PID 1060 wrote to memory of 1360 1060 explore.exe 89 PID 1060 wrote to memory of 1360 1060 explore.exe 89 PID 1060 wrote to memory of 1360 1060 explore.exe 89 PID 1360 wrote to memory of 4680 1360 explore.exe 90 PID 1360 wrote to memory of 4680 1360 explore.exe 90 PID 1360 wrote to memory of 4680 1360 explore.exe 90 PID 4680 wrote to memory of 1784 4680 explore.exe 91 PID 4680 wrote to memory of 1784 4680 explore.exe 91 PID 4680 wrote to memory of 1784 4680 explore.exe 91 PID 1784 wrote to memory of 3184 1784 explore.exe 92 PID 1784 wrote to memory of 3184 1784 explore.exe 92 PID 1784 wrote to memory of 3184 1784 explore.exe 92 PID 3184 wrote to memory of 5028 3184 explore.exe 93 PID 3184 wrote to memory of 5028 3184 explore.exe 93 PID 3184 wrote to memory of 5028 3184 explore.exe 93 PID 5028 wrote to memory of 1728 5028 explore.exe 94 PID 5028 wrote to memory of 1728 5028 explore.exe 94 PID 5028 wrote to memory of 1728 5028 explore.exe 94 PID 1728 wrote to memory of 1016 1728 explore.exe 95 PID 1728 wrote to memory of 1016 1728 explore.exe 95 PID 1728 wrote to memory of 1016 1728 explore.exe 95 PID 1016 wrote to memory of 4252 1016 explore.exe 96 PID 1016 wrote to memory of 4252 1016 explore.exe 96 PID 1016 wrote to memory of 4252 1016 explore.exe 96 PID 4252 wrote to memory of 3528 4252 explore.exe 97 PID 4252 wrote to memory of 3528 4252 explore.exe 97 PID 4252 wrote to memory of 3528 4252 explore.exe 97 PID 3528 wrote to memory of 2612 3528 explore.exe 98 PID 3528 wrote to memory of 2612 3528 explore.exe 98 PID 3528 wrote to memory of 2612 3528 explore.exe 98 PID 2612 wrote to memory of 5048 2612 explore.exe 99 PID 2612 wrote to memory of 5048 2612 explore.exe 99 PID 2612 wrote to memory of 5048 2612 explore.exe 99 PID 5048 wrote to memory of 324 5048 explore.exe 100 PID 5048 wrote to memory of 324 5048 explore.exe 100 PID 5048 wrote to memory of 324 5048 explore.exe 100 PID 324 wrote to memory of 3780 324 explore.exe 101 PID 324 wrote to memory of 3780 324 explore.exe 101 PID 324 wrote to memory of 3780 324 explore.exe 101 PID 3780 wrote to memory of 3900 3780 explore.exe 102 PID 3780 wrote to memory of 3900 3780 explore.exe 102 PID 3780 wrote to memory of 3900 3780 explore.exe 102 PID 3900 wrote to memory of 3332 3900 explore.exe 103 PID 3900 wrote to memory of 3332 3900 explore.exe 103 PID 3900 wrote to memory of 3332 3900 explore.exe 103 PID 3332 wrote to memory of 3812 3332 explore.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\d594c186f9660bcf2bc3fdb127dbdf7c_JaffaCakes118.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ztchao.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ztchao.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:404 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:460 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe8⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4680 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1784 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4252 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5048 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:324 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe21⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3332 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe23⤵
- Executes dropped EXE
PID:3812 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe24⤵
- Executes dropped EXE
PID:4408 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe25⤵
- Executes dropped EXE
PID:3660 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe26⤵
- Executes dropped EXE
PID:4736 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe27⤵
- Executes dropped EXE
PID:4668 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe28⤵
- Executes dropped EXE
PID:4972 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe29⤵
- Executes dropped EXE
PID:512 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe30⤵
- Executes dropped EXE
PID:3772 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe31⤵
- Executes dropped EXE
PID:5008 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe32⤵
- Executes dropped EXE
PID:1252 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe33⤵
- Executes dropped EXE
PID:2932 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe34⤵
- Executes dropped EXE
PID:1772 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe35⤵
- Executes dropped EXE
PID:1260 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe36⤵
- Executes dropped EXE
PID:2648 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe37⤵
- Executes dropped EXE
PID:1928 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe38⤵
- Executes dropped EXE
PID:1672 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe39⤵
- Executes dropped EXE
PID:1476 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe40⤵
- Executes dropped EXE
PID:2396 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe41⤵
- Executes dropped EXE
PID:2736 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe42⤵
- Executes dropped EXE
PID:4464 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe43⤵
- Executes dropped EXE
PID:4940 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe44⤵
- Executes dropped EXE
PID:5052 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe45⤵
- Executes dropped EXE
PID:4500 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe46⤵
- Executes dropped EXE
PID:2620 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe47⤵
- Executes dropped EXE
PID:2008 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe48⤵
- Executes dropped EXE
PID:4912 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe49⤵
- Executes dropped EXE
PID:4748 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe50⤵
- Executes dropped EXE
PID:4088 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe51⤵
- Executes dropped EXE
PID:5100 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe52⤵
- Executes dropped EXE
PID:2012 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe53⤵
- Executes dropped EXE
PID:4896 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe54⤵
- Executes dropped EXE
PID:1800 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe55⤵
- Executes dropped EXE
PID:2928 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe56⤵
- Executes dropped EXE
PID:4728 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe57⤵
- Executes dropped EXE
PID:864 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe58⤵
- Executes dropped EXE
PID:4108 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe59⤵
- Executes dropped EXE
PID:4132 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe60⤵
- Executes dropped EXE
PID:2552 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe61⤵
- Executes dropped EXE
PID:996 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe62⤵
- Executes dropped EXE
PID:1504 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe63⤵
- Executes dropped EXE
PID:3748 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe64⤵
- Executes dropped EXE
PID:2892 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe65⤵
- Executes dropped EXE
PID:2484 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe66⤵PID:1788
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe67⤵PID:4344
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe68⤵PID:3048
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe69⤵PID:2044
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe70⤵PID:1636
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe71⤵PID:4856
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe72⤵PID:1212
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe73⤵PID:1660
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe74⤵PID:2352
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe75⤵PID:2124
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe76⤵PID:4372
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe77⤵PID:364
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe78⤵PID:2708
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe79⤵PID:660
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe80⤵PID:3368
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe81⤵PID:3672
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe82⤵PID:216
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe83⤵PID:5084
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe84⤵PID:1072
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe85⤵PID:4800
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe86⤵PID:3576
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe87⤵PID:4000
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe88⤵
- Drops file in System32 directory
PID:4792 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe89⤵PID:4808
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe90⤵PID:1088
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe91⤵PID:2784
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe92⤵PID:4920
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe93⤵PID:3376
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe94⤵PID:4080
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe95⤵PID:392
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe96⤵PID:4944
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe97⤵PID:2212
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe98⤵PID:4568
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe99⤵PID:3792
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe100⤵PID:688
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe101⤵PID:4888
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe102⤵PID:3532
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe103⤵PID:2684
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe104⤵PID:4516
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe105⤵PID:3668
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe106⤵PID:4956
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe107⤵PID:4380
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe108⤵PID:452
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe109⤵
- Drops file in System32 directory
PID:1884 -
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe110⤵PID:4652
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe111⤵PID:3104
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe112⤵PID:1820
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe113⤵PID:3088
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe114⤵PID:532
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe115⤵PID:5040
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe116⤵PID:5140
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe117⤵PID:5160
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe118⤵PID:5184
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe119⤵PID:5204
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe120⤵PID:5236
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe121⤵PID:5260
-
C:\Windows\SysWOW64\explore.exeC:\Windows\system32\explore.exe122⤵PID:5280
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-