Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
09-12-2024 23:42
Static task
static1
Behavioral task
behavioral1
Sample
dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe
-
Size
243KB
-
MD5
dc0b1b3f27ad7d84bbc3e05f9481109a
-
SHA1
c0325f71da42b15a9ff8fb6dfc3183b1d195d3de
-
SHA256
aec91840021bf048d278bbc98c2d6538a48c93f9b16cac0339be326783e8f2bc
-
SHA512
7baaf946ae8565726b16289eb5bc3753cb18bddb1fa7e72f026e3b663290ea6e8915bbef7d0e4f329dc465727595aeffeafe9e28c1523720f7a62eec519291d5
-
SSDEEP
3072:S3b/eHVkDXy7HPaLGEqDNw7/tPYSRwjVxKx9YLRd3o5/mSB9oySEpin4DO87+DLH:SiHVkDXiaLlGQ1RUVtLn3E1B9lS4HyzL
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2864 wcoredg.exe -
Executes dropped EXE 64 IoCs
pid Process 2856 wcoredg.exe 2864 wcoredg.exe 2288 wcoredg.exe 2848 wcoredg.exe 2780 wcoredg.exe 1204 wcoredg.exe 2004 wcoredg.exe 1756 wcoredg.exe 1660 wcoredg.exe 1460 wcoredg.exe 468 wcoredg.exe 2952 wcoredg.exe 2212 wcoredg.exe 3044 wcoredg.exe 844 wcoredg.exe 1544 wcoredg.exe 1264 wcoredg.exe 1728 wcoredg.exe 2200 wcoredg.exe 1228 wcoredg.exe 2460 wcoredg.exe 1944 wcoredg.exe 1540 wcoredg.exe 2336 wcoredg.exe 296 wcoredg.exe 2836 wcoredg.exe 2964 wcoredg.exe 1464 wcoredg.exe 892 wcoredg.exe 2140 wcoredg.exe 1476 wcoredg.exe 2008 wcoredg.exe 2156 wcoredg.exe 1292 wcoredg.exe 1796 wcoredg.exe 772 wcoredg.exe 1008 wcoredg.exe 1428 wcoredg.exe 448 wcoredg.exe 2656 wcoredg.exe 1320 wcoredg.exe 1552 wcoredg.exe 1488 wcoredg.exe 1480 wcoredg.exe 1376 wcoredg.exe 2404 wcoredg.exe 2012 wcoredg.exe 2460 wcoredg.exe 1536 wcoredg.exe 2172 wcoredg.exe 2932 wcoredg.exe 2264 wcoredg.exe 2900 wcoredg.exe 2988 wcoredg.exe 2736 wcoredg.exe 2384 wcoredg.exe 2072 wcoredg.exe 1808 wcoredg.exe 1644 wcoredg.exe 856 wcoredg.exe 1560 wcoredg.exe 2016 wcoredg.exe 2084 wcoredg.exe 2564 wcoredg.exe -
Loads dropped DLL 64 IoCs
pid Process 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 2864 wcoredg.exe 2864 wcoredg.exe 2848 wcoredg.exe 2848 wcoredg.exe 1204 wcoredg.exe 1204 wcoredg.exe 1756 wcoredg.exe 1756 wcoredg.exe 1460 wcoredg.exe 1460 wcoredg.exe 2952 wcoredg.exe 2952 wcoredg.exe 3044 wcoredg.exe 3044 wcoredg.exe 1544 wcoredg.exe 1544 wcoredg.exe 1728 wcoredg.exe 1728 wcoredg.exe 1228 wcoredg.exe 1228 wcoredg.exe 1944 wcoredg.exe 1944 wcoredg.exe 2336 wcoredg.exe 2336 wcoredg.exe 2836 wcoredg.exe 2836 wcoredg.exe 1464 wcoredg.exe 1464 wcoredg.exe 2140 wcoredg.exe 2140 wcoredg.exe 2008 wcoredg.exe 2008 wcoredg.exe 1292 wcoredg.exe 1292 wcoredg.exe 772 wcoredg.exe 772 wcoredg.exe 1428 wcoredg.exe 1428 wcoredg.exe 2656 wcoredg.exe 2656 wcoredg.exe 1552 wcoredg.exe 1552 wcoredg.exe 1480 wcoredg.exe 1480 wcoredg.exe 2404 wcoredg.exe 2404 wcoredg.exe 2460 wcoredg.exe 2460 wcoredg.exe 2172 wcoredg.exe 2172 wcoredg.exe 2264 wcoredg.exe 2264 wcoredg.exe 2988 wcoredg.exe 2988 wcoredg.exe 2384 wcoredg.exe 2384 wcoredg.exe 1808 wcoredg.exe 1808 wcoredg.exe 856 wcoredg.exe 856 wcoredg.exe 2016 wcoredg.exe 2016 wcoredg.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File opened for modification C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe File created C:\Windows\SysWOW64\wcoredg.exe wcoredg.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2316 set thread context of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2856 set thread context of 2864 2856 wcoredg.exe 33 PID 2288 set thread context of 2848 2288 wcoredg.exe 35 PID 2780 set thread context of 1204 2780 wcoredg.exe 37 PID 2004 set thread context of 1756 2004 wcoredg.exe 39 PID 1660 set thread context of 1460 1660 wcoredg.exe 41 PID 468 set thread context of 2952 468 wcoredg.exe 43 PID 2212 set thread context of 3044 2212 wcoredg.exe 45 PID 844 set thread context of 1544 844 wcoredg.exe 47 PID 1264 set thread context of 1728 1264 wcoredg.exe 49 PID 2200 set thread context of 1228 2200 wcoredg.exe 51 PID 2460 set thread context of 1944 2460 wcoredg.exe 53 PID 1540 set thread context of 2336 1540 wcoredg.exe 55 PID 296 set thread context of 2836 296 wcoredg.exe 57 PID 2964 set thread context of 1464 2964 wcoredg.exe 59 PID 892 set thread context of 2140 892 wcoredg.exe 61 PID 1476 set thread context of 2008 1476 wcoredg.exe 63 PID 2156 set thread context of 1292 2156 wcoredg.exe 65 PID 1796 set thread context of 772 1796 wcoredg.exe 67 PID 1008 set thread context of 1428 1008 wcoredg.exe 69 PID 448 set thread context of 2656 448 wcoredg.exe 71 PID 1320 set thread context of 1552 1320 wcoredg.exe 73 PID 1488 set thread context of 1480 1488 wcoredg.exe 75 PID 1376 set thread context of 2404 1376 wcoredg.exe 77 PID 2012 set thread context of 2460 2012 wcoredg.exe 79 PID 1536 set thread context of 2172 1536 wcoredg.exe 81 PID 2932 set thread context of 2264 2932 wcoredg.exe 83 PID 2900 set thread context of 2988 2900 wcoredg.exe 85 PID 2736 set thread context of 2384 2736 wcoredg.exe 87 PID 2072 set thread context of 1808 2072 wcoredg.exe 89 PID 1644 set thread context of 856 1644 wcoredg.exe 91 PID 1560 set thread context of 2016 1560 wcoredg.exe 93 PID 2084 set thread context of 2564 2084 wcoredg.exe 95 PID 2272 set thread context of 2612 2272 wcoredg.exe 97 PID 1812 set thread context of 1968 1812 wcoredg.exe 99 PID 2052 set thread context of 1736 2052 wcoredg.exe 101 PID 2344 set thread context of 2412 2344 wcoredg.exe 103 PID 1972 set thread context of 2568 1972 wcoredg.exe 105 PID 2352 set thread context of 1536 2352 wcoredg.exe 107 PID 2320 set thread context of 2860 2320 wcoredg.exe 109 PID 2280 set thread context of 2732 2280 wcoredg.exe 111 PID 2764 set thread context of 1048 2764 wcoredg.exe 113 PID 808 set thread context of 268 808 wcoredg.exe 115 PID 1644 set thread context of 2164 1644 wcoredg.exe 117 PID 1660 set thread context of 468 1660 wcoredg.exe 119 PID 2084 set thread context of 580 2084 wcoredg.exe 121 PID 1584 set thread context of 2272 1584 wcoredg.exe 123 PID 2300 set thread context of 1320 2300 wcoredg.exe 125 PID 2808 set thread context of 284 2808 wcoredg.exe 127 PID 2560 set thread context of 2268 2560 wcoredg.exe 130 PID 1748 set thread context of 2128 1748 wcoredg.exe 132 PID 2976 set thread context of 3000 2976 wcoredg.exe 136 PID 2828 set thread context of 296 2828 wcoredg.exe 138 PID 2096 set thread context of 3008 2096 wcoredg.exe 140 PID 1484 set thread context of 2072 1484 wcoredg.exe 142 PID 928 set thread context of 1216 928 wcoredg.exe 144 PID 1684 set thread context of 2020 1684 wcoredg.exe 146 PID 2208 set thread context of 316 2208 wcoredg.exe 148 PID 1028 set thread context of 1792 1028 wcoredg.exe 150 PID 2024 set thread context of 1812 2024 wcoredg.exe 152 PID 1952 set thread context of 788 1952 wcoredg.exe 154 PID 1444 set thread context of 2560 1444 wcoredg.exe 156 PID 1136 set thread context of 1748 1136 wcoredg.exe 158 PID 2524 set thread context of 864 2524 wcoredg.exe 160 -
resource yara_rule behavioral1/memory/2100-3-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-4-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-9-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-8-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-7-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-6-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-2-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2100-22-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-34-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-33-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-32-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-31-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2864-40-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2848-51-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2848-57-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1204-68-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1204-75-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1756-86-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1756-84-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1756-85-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1756-92-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-103-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-102-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-101-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1460-110-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2952-121-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2952-127-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/3044-138-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/3044-145-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1544-156-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1544-163-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1728-174-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1728-180-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1228-191-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1228-197-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1944-208-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1944-215-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2336-226-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2336-232-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2836-243-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2836-250-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1464-260-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1464-263-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2140-273-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2140-276-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2008-286-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2008-289-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1292-299-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1292-302-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/772-312-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/772-315-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1428-324-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1428-328-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2656-338-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2656-341-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1552-350-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1552-354-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1480-363-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/1480-367-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2404-377-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2404-380-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2460-390-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2460-393-0x0000000000400000-0x0000000000464000-memory.dmp upx behavioral1/memory/2172-403-0x0000000000400000-0x0000000000464000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wcoredg.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 2864 wcoredg.exe 2848 wcoredg.exe 1204 wcoredg.exe 1756 wcoredg.exe 1460 wcoredg.exe 2952 wcoredg.exe 3044 wcoredg.exe 1544 wcoredg.exe 1728 wcoredg.exe 1228 wcoredg.exe 1944 wcoredg.exe 2336 wcoredg.exe 2836 wcoredg.exe 1464 wcoredg.exe 2140 wcoredg.exe 2008 wcoredg.exe 1292 wcoredg.exe 772 wcoredg.exe 1428 wcoredg.exe 2656 wcoredg.exe 1552 wcoredg.exe 1480 wcoredg.exe 2404 wcoredg.exe 2460 wcoredg.exe 2172 wcoredg.exe 2264 wcoredg.exe 2988 wcoredg.exe 2384 wcoredg.exe 1808 wcoredg.exe 856 wcoredg.exe 2016 wcoredg.exe 2564 wcoredg.exe 2612 wcoredg.exe 1968 wcoredg.exe 1736 wcoredg.exe 2412 wcoredg.exe 2568 wcoredg.exe 1536 wcoredg.exe 2860 wcoredg.exe 2732 wcoredg.exe 1048 wcoredg.exe 268 wcoredg.exe 2164 wcoredg.exe 468 wcoredg.exe 580 wcoredg.exe 2272 wcoredg.exe 1320 wcoredg.exe 284 wcoredg.exe 2268 wcoredg.exe 2128 wcoredg.exe 1436 wcoredg.exe 3000 wcoredg.exe 296 wcoredg.exe 3008 wcoredg.exe 2072 wcoredg.exe 1216 wcoredg.exe 2020 wcoredg.exe 316 wcoredg.exe 1792 wcoredg.exe 1812 wcoredg.exe 788 wcoredg.exe 2560 wcoredg.exe 1748 wcoredg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2316 wrote to memory of 2100 2316 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 31 PID 2100 wrote to memory of 2856 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2856 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2856 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 32 PID 2100 wrote to memory of 2856 2100 dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe 32 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2856 wrote to memory of 2864 2856 wcoredg.exe 33 PID 2864 wrote to memory of 2288 2864 wcoredg.exe 34 PID 2864 wrote to memory of 2288 2864 wcoredg.exe 34 PID 2864 wrote to memory of 2288 2864 wcoredg.exe 34 PID 2864 wrote to memory of 2288 2864 wcoredg.exe 34 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2288 wrote to memory of 2848 2288 wcoredg.exe 35 PID 2848 wrote to memory of 2780 2848 wcoredg.exe 36 PID 2848 wrote to memory of 2780 2848 wcoredg.exe 36 PID 2848 wrote to memory of 2780 2848 wcoredg.exe 36 PID 2848 wrote to memory of 2780 2848 wcoredg.exe 36 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 2780 wrote to memory of 1204 2780 wcoredg.exe 37 PID 1204 wrote to memory of 2004 1204 wcoredg.exe 38 PID 1204 wrote to memory of 2004 1204 wcoredg.exe 38 PID 1204 wrote to memory of 2004 1204 wcoredg.exe 38 PID 1204 wrote to memory of 2004 1204 wcoredg.exe 38 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 2004 wrote to memory of 1756 2004 wcoredg.exe 39 PID 1756 wrote to memory of 1660 1756 wcoredg.exe 40 PID 1756 wrote to memory of 1660 1756 wcoredg.exe 40 PID 1756 wrote to memory of 1660 1756 wcoredg.exe 40 PID 1756 wrote to memory of 1660 1756 wcoredg.exe 40 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1660 wrote to memory of 1460 1660 wcoredg.exe 41 PID 1460 wrote to memory of 468 1460 wcoredg.exe 42 PID 1460 wrote to memory of 468 1460 wcoredg.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\dc0b1b3f27ad7d84bbc3e05f9481109a_JaffaCakes118.exe"2⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Users\Admin\AppData\Local\Temp\DC0B1B~1.EXE3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Users\Admin\AppData\Local\Temp\DC0B1B~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2288 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:468 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2952 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2212 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3044 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:844 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1544 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1264 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1728 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2200 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1228 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2460 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1944 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1540 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2336 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:296 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2836 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2964 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1464 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:892 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1476 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe34⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2008 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2156 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1292 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1796 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe38⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:772 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1008 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe40⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:448 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2656 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1320 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe44⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1552 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe46⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1480 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2404 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2012 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe50⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2460 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1536 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe52⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2172 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2932 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe54⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2900 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe56⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2988 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2736 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe58⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2072 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe60⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1644 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:856 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1560 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe64⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2016 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe66⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2564 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe68⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2612 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe69⤵
- Suspicious use of SetThreadContext
PID:1812 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe70⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe71⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe72⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1736 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe73⤵
- Suspicious use of SetThreadContext
PID:2344 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe74⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2412 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe75⤵
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe76⤵
- Suspicious behavior: EnumeratesProcesses
PID:2568 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2352 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe78⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1536 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe79⤵
- Suspicious use of SetThreadContext
PID:2320 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe81⤵
- Suspicious use of SetThreadContext
PID:2280 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe82⤵
- Suspicious behavior: EnumeratesProcesses
PID:2732 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe83⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2764 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe84⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1048 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe85⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:808 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe86⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:268 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe87⤵
- Suspicious use of SetThreadContext
PID:1644 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe88⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2164 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1660 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe90⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:468 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe91⤵
- Suspicious use of SetThreadContext
PID:2084 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe92⤵
- Suspicious behavior: EnumeratesProcesses
PID:580 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe93⤵
- Suspicious use of SetThreadContext
PID:1584 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe94⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2272 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2300 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe96⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1320 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe97⤵
- Suspicious use of SetThreadContext
PID:2808 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe98⤵
- Suspicious behavior: EnumeratesProcesses
PID:284 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe99⤵
- Suspicious use of SetThreadContext
PID:2560 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe100⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2268 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe101⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1748 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe102⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2128 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe103⤵
- System Location Discovery: System Language Discovery
PID:2468 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe104⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1436 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe105⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2976 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe106⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3000 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe107⤵
- Suspicious use of SetThreadContext
PID:2828 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe108⤵
- Suspicious behavior: EnumeratesProcesses
PID:296 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe109⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2096 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe110⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe111⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1484 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe112⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe113⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:928 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe114⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1216 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe115⤵
- Suspicious use of SetThreadContext
PID:1684 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe116⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe117⤵
- Suspicious use of SetThreadContext
PID:2208 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe118⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe119⤵
- Suspicious use of SetThreadContext
PID:1028 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe120⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\system32\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe121⤵
- Suspicious use of SetThreadContext
PID:2024 -
C:\Windows\SysWOW64\wcoredg.exe"C:\Windows\SysWOW64\wcoredg.exe" C:\Windows\SysWOW64\wcoredg.exe122⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1812
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-