Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 22:05
Static task
static1
Behavioral task
behavioral1
Sample
dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe
-
Size
158KB
-
MD5
dbc3829eb9edf84754aec2e921b121db
-
SHA1
3c456e58346bd6765a6fa59d851d944f5e8c58fc
-
SHA256
e67bd969561c76c94f277dce717a048bde9f3b22ee6c22b6c4d65decf1446dba
-
SHA512
a934509925b2b8a29101f09236fcedb90d4c717eabde5268b1da62357a6a72319dfcc9de462c710c2b1725c813016cfacb9ec112a054a8d5690ca5589f363453
-
SSDEEP
3072:RUe7bPQSaI3zHILBLfovfuMVOgwKQLBhq+j5cqdIEPAGuclQ:B7USSBLgunh98+j5/IEPHucQ
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2548 MsDbClient.exe -
Executes dropped EXE 64 IoCs
pid Process 2648 MsDbClient.exe 2548 MsDbClient.exe 1756 MsDbClient.exe 2336 MsDbClient.exe 1516 MsDbClient.exe 2828 MsDbClient.exe 2256 MsDbClient.exe 684 MsDbClient.exe 1100 MsDbClient.exe 320 MsDbClient.exe 1256 MsDbClient.exe 2248 MsDbClient.exe 2080 MsDbClient.exe 1004 MsDbClient.exe 1800 MsDbClient.exe 2384 MsDbClient.exe 1348 MsDbClient.exe 1056 MsDbClient.exe 2124 MsDbClient.exe 1880 MsDbClient.exe 1652 MsDbClient.exe 1600 MsDbClient.exe 2896 MsDbClient.exe 2720 MsDbClient.exe 2700 MsDbClient.exe 2088 MsDbClient.exe 1748 MsDbClient.exe 2376 MsDbClient.exe 2420 MsDbClient.exe 2852 MsDbClient.exe 272 MsDbClient.exe 2940 MsDbClient.exe 1824 MsDbClient.exe 644 MsDbClient.exe 2904 MsDbClient.exe 2504 MsDbClient.exe 964 MsDbClient.exe 1336 MsDbClient.exe 1800 MsDbClient.exe 1376 MsDbClient.exe 1236 MsDbClient.exe 2432 MsDbClient.exe 2800 MsDbClient.exe 2428 MsDbClient.exe 1956 MsDbClient.exe 3068 MsDbClient.exe 2780 MsDbClient.exe 1724 MsDbClient.exe 2988 MsDbClient.exe 2544 MsDbClient.exe 1748 MsDbClient.exe 1516 MsDbClient.exe 1648 MsDbClient.exe 2816 MsDbClient.exe 1308 MsDbClient.exe 584 MsDbClient.exe 1108 MsDbClient.exe 696 MsDbClient.exe 1784 MsDbClient.exe 2396 MsDbClient.exe 2916 MsDbClient.exe 2356 MsDbClient.exe 108 MsDbClient.exe 1936 MsDbClient.exe -
Loads dropped DLL 64 IoCs
pid Process 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 2648 MsDbClient.exe 2548 MsDbClient.exe 2548 MsDbClient.exe 2336 MsDbClient.exe 2336 MsDbClient.exe 2828 MsDbClient.exe 2828 MsDbClient.exe 684 MsDbClient.exe 684 MsDbClient.exe 320 MsDbClient.exe 320 MsDbClient.exe 2248 MsDbClient.exe 2248 MsDbClient.exe 1004 MsDbClient.exe 1004 MsDbClient.exe 2384 MsDbClient.exe 2384 MsDbClient.exe 1056 MsDbClient.exe 1056 MsDbClient.exe 1880 MsDbClient.exe 1880 MsDbClient.exe 1600 MsDbClient.exe 1600 MsDbClient.exe 2720 MsDbClient.exe 2720 MsDbClient.exe 2088 MsDbClient.exe 2088 MsDbClient.exe 2376 MsDbClient.exe 2376 MsDbClient.exe 2852 MsDbClient.exe 2852 MsDbClient.exe 2940 MsDbClient.exe 2940 MsDbClient.exe 644 MsDbClient.exe 644 MsDbClient.exe 2504 MsDbClient.exe 2504 MsDbClient.exe 1336 MsDbClient.exe 1336 MsDbClient.exe 1376 MsDbClient.exe 1376 MsDbClient.exe 2432 MsDbClient.exe 2432 MsDbClient.exe 2428 MsDbClient.exe 2428 MsDbClient.exe 3068 MsDbClient.exe 3068 MsDbClient.exe 1724 MsDbClient.exe 1724 MsDbClient.exe 2544 MsDbClient.exe 2544 MsDbClient.exe 1516 MsDbClient.exe 1516 MsDbClient.exe 2816 MsDbClient.exe 2816 MsDbClient.exe 584 MsDbClient.exe 584 MsDbClient.exe 696 MsDbClient.exe 696 MsDbClient.exe 2396 MsDbClient.exe 2396 MsDbClient.exe 2356 MsDbClient.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum MsDbClient.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 MsDbClient.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe File created C:\Windows\SysWOW64\MsDbClient.exe dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File created C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe File opened for modification C:\Windows\SysWOW64\MsDbClient.exe MsDbClient.exe -
Suspicious use of SetThreadContext 46 IoCs
description pid Process procid_target PID 2616 set thread context of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2648 set thread context of 2548 2648 MsDbClient.exe 32 PID 1756 set thread context of 2336 1756 MsDbClient.exe 34 PID 1516 set thread context of 2828 1516 MsDbClient.exe 36 PID 2256 set thread context of 684 2256 MsDbClient.exe 38 PID 1100 set thread context of 320 1100 MsDbClient.exe 40 PID 1256 set thread context of 2248 1256 MsDbClient.exe 42 PID 2080 set thread context of 1004 2080 MsDbClient.exe 44 PID 1800 set thread context of 2384 1800 MsDbClient.exe 46 PID 1348 set thread context of 1056 1348 MsDbClient.exe 48 PID 2124 set thread context of 1880 2124 MsDbClient.exe 50 PID 1652 set thread context of 1600 1652 MsDbClient.exe 52 PID 2896 set thread context of 2720 2896 MsDbClient.exe 54 PID 2700 set thread context of 2088 2700 MsDbClient.exe 56 PID 1748 set thread context of 2376 1748 MsDbClient.exe 58 PID 2420 set thread context of 2852 2420 MsDbClient.exe 60 PID 272 set thread context of 2940 272 MsDbClient.exe 62 PID 1824 set thread context of 644 1824 MsDbClient.exe 64 PID 2904 set thread context of 2504 2904 MsDbClient.exe 66 PID 964 set thread context of 1336 964 MsDbClient.exe 68 PID 1800 set thread context of 1376 1800 MsDbClient.exe 70 PID 1236 set thread context of 2432 1236 MsDbClient.exe 72 PID 2800 set thread context of 2428 2800 MsDbClient.exe 74 PID 1956 set thread context of 3068 1956 MsDbClient.exe 76 PID 2780 set thread context of 1724 2780 MsDbClient.exe 79 PID 2988 set thread context of 2544 2988 MsDbClient.exe 81 PID 1748 set thread context of 1516 1748 MsDbClient.exe 83 PID 1648 set thread context of 2816 1648 MsDbClient.exe 85 PID 1308 set thread context of 584 1308 MsDbClient.exe 87 PID 1108 set thread context of 696 1108 MsDbClient.exe 89 PID 1784 set thread context of 2396 1784 MsDbClient.exe 91 PID 2916 set thread context of 2356 2916 MsDbClient.exe 93 PID 108 set thread context of 1936 108 MsDbClient.exe 95 PID 1348 set thread context of 2620 1348 MsDbClient.exe 97 PID 1216 set thread context of 1656 1216 MsDbClient.exe 99 PID 2564 set thread context of 1492 2564 MsDbClient.exe 101 PID 1928 set thread context of 2296 1928 MsDbClient.exe 103 PID 2776 set thread context of 2796 2776 MsDbClient.exe 105 PID 2000 set thread context of 2144 2000 MsDbClient.exe 107 PID 2164 set thread context of 2200 2164 MsDbClient.exe 109 PID 2824 set thread context of 636 2824 MsDbClient.exe 111 PID 2760 set thread context of 2708 2760 MsDbClient.exe 113 PID 772 set thread context of 2452 772 MsDbClient.exe 115 PID 2476 set thread context of 2208 2476 MsDbClient.exe 117 PID 812 set thread context of 2204 812 MsDbClient.exe 119 PID 316 set thread context of 1788 316 MsDbClient.exe 121 -
resource yara_rule behavioral1/memory/2244-10-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-12-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-11-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-9-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-8-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-2-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-6-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-4-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2244-25-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2548-36-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2548-35-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2548-37-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2548-38-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2548-44-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2336-54-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2336-61-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2828-73-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2828-79-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/684-90-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/684-96-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/320-108-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/320-115-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2248-126-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2248-132-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1004-149-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2384-160-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2384-165-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-177-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1056-184-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1880-195-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1880-200-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1600-212-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1600-219-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2720-230-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2720-236-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-246-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2088-253-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2376-264-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2376-267-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2852-276-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2852-280-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2940-290-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2940-293-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/644-303-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/644-306-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2504-316-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2504-319-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1336-329-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1336-332-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1376-341-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1376-345-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2432-355-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2432-358-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2428-368-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2428-371-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3068-380-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/3068-384-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1724-392-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1724-397-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2544-409-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/1516-421-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2816-429-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/2816-434-0x0000000000400000-0x000000000046C000-memory.dmp upx behavioral1/memory/584-446-0x0000000000400000-0x000000000046C000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language MsDbClient.exe -
Suspicious behavior: EnumeratesProcesses 45 IoCs
pid Process 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 2548 MsDbClient.exe 2336 MsDbClient.exe 2828 MsDbClient.exe 684 MsDbClient.exe 320 MsDbClient.exe 2248 MsDbClient.exe 1004 MsDbClient.exe 2384 MsDbClient.exe 1056 MsDbClient.exe 1880 MsDbClient.exe 1600 MsDbClient.exe 2720 MsDbClient.exe 2088 MsDbClient.exe 2376 MsDbClient.exe 2852 MsDbClient.exe 2940 MsDbClient.exe 644 MsDbClient.exe 2504 MsDbClient.exe 1336 MsDbClient.exe 1376 MsDbClient.exe 2432 MsDbClient.exe 2428 MsDbClient.exe 3068 MsDbClient.exe 1724 MsDbClient.exe 2544 MsDbClient.exe 1516 MsDbClient.exe 2816 MsDbClient.exe 584 MsDbClient.exe 696 MsDbClient.exe 2396 MsDbClient.exe 2356 MsDbClient.exe 1936 MsDbClient.exe 2620 MsDbClient.exe 1656 MsDbClient.exe 1492 MsDbClient.exe 2296 MsDbClient.exe 2796 MsDbClient.exe 2144 MsDbClient.exe 2200 MsDbClient.exe 636 MsDbClient.exe 2708 MsDbClient.exe 2452 MsDbClient.exe 2208 MsDbClient.exe 2204 MsDbClient.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2616 wrote to memory of 2244 2616 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 30 PID 2244 wrote to memory of 2648 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 31 PID 2244 wrote to memory of 2648 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 31 PID 2244 wrote to memory of 2648 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 31 PID 2244 wrote to memory of 2648 2244 dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe 31 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2648 wrote to memory of 2548 2648 MsDbClient.exe 32 PID 2548 wrote to memory of 1756 2548 MsDbClient.exe 33 PID 2548 wrote to memory of 1756 2548 MsDbClient.exe 33 PID 2548 wrote to memory of 1756 2548 MsDbClient.exe 33 PID 2548 wrote to memory of 1756 2548 MsDbClient.exe 33 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 1756 wrote to memory of 2336 1756 MsDbClient.exe 34 PID 2336 wrote to memory of 1516 2336 MsDbClient.exe 35 PID 2336 wrote to memory of 1516 2336 MsDbClient.exe 35 PID 2336 wrote to memory of 1516 2336 MsDbClient.exe 35 PID 2336 wrote to memory of 1516 2336 MsDbClient.exe 35 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 1516 wrote to memory of 2828 1516 MsDbClient.exe 36 PID 2828 wrote to memory of 2256 2828 MsDbClient.exe 37 PID 2828 wrote to memory of 2256 2828 MsDbClient.exe 37 PID 2828 wrote to memory of 2256 2828 MsDbClient.exe 37 PID 2828 wrote to memory of 2256 2828 MsDbClient.exe 37 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 2256 wrote to memory of 684 2256 MsDbClient.exe 38 PID 684 wrote to memory of 1100 684 MsDbClient.exe 39 PID 684 wrote to memory of 1100 684 MsDbClient.exe 39 PID 684 wrote to memory of 1100 684 MsDbClient.exe 39 PID 684 wrote to memory of 1100 684 MsDbClient.exe 39 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 1100 wrote to memory of 320 1100 MsDbClient.exe 40 PID 320 wrote to memory of 1256 320 MsDbClient.exe 41 PID 320 wrote to memory of 1256 320 MsDbClient.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dbc3829eb9edf84754aec2e921b121db_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Users\Admin\AppData\Local\Temp\DBC382~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Users\Admin\AppData\Local\Temp\DBC382~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1256 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2080 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1004 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1800 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1348 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1056 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1880 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1652 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1600 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2896 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2720 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2700 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2088 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2376 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2420 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2852 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:272 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1824 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:644 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2504 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:964 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1336 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1800 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1376 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1236 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2432 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2800 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2428 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1956 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3068 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2780 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1724 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2988 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2544 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1748 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1516 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1648 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2816 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1308 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:584 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1108 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:696 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1784 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE62⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2396 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2916 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2356 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:108 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE67⤵
- Suspicious use of SetThreadContext
PID:1348 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2620 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE69⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1216 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE71⤵
- Suspicious use of SetThreadContext
PID:2564 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1492 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1928 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE74⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2296 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2776 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2796 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE77⤵
- Suspicious use of SetThreadContext
PID:2000 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2200 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE81⤵
- Suspicious use of SetThreadContext
PID:2824 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE82⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2760 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2708 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:772 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE86⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2476 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2208 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:812 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE90⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2204 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\system32\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:316 -
C:\Windows\SysWOW64\MsDbClient.exe"C:\Windows\SysWOW64\MsDbClient.exe" C:\Windows\SysWOW64\MSDBCL~1.EXE92⤵
- Maps connected drives based on registry
PID:1788
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
158KB
MD5dbc3829eb9edf84754aec2e921b121db
SHA13c456e58346bd6765a6fa59d851d944f5e8c58fc
SHA256e67bd969561c76c94f277dce717a048bde9f3b22ee6c22b6c4d65decf1446dba
SHA512a934509925b2b8a29101f09236fcedb90d4c717eabde5268b1da62357a6a72319dfcc9de462c710c2b1725c813016cfacb9ec112a054a8d5690ca5589f363453