Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
69s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
12/12/2024, 02:46
Behavioral task
behavioral1
Sample
e45765493caf8308294100c216f5276e_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
e45765493caf8308294100c216f5276e_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e45765493caf8308294100c216f5276e_JaffaCakes118.exe
-
Size
962KB
-
MD5
e45765493caf8308294100c216f5276e
-
SHA1
a555c794ed5d64b79c86fe42c7ba41e8135faed3
-
SHA256
dc93b82ab542530e3b506c0b693fe1aeb5b711ad870600a72c0df57206178f72
-
SHA512
2158752d3472f6328648716d93ef4117762dd071a0744646e66af46c8fd3bcc1aa1894e9de2d037e7ce01b72ecea8047427cfef0e55095b51f957deb7375a69a
-
SSDEEP
12288:fQ79F4wACY4QMnHRXC5714bir9VMQUUYMlc9IMDzHa6ACQTtLvcoKMGMMMCMMMp:faDdW52PHa6ytIoK9MMMCMMMp
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 64 IoCs
resource yara_rule behavioral1/memory/2256-61-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2992-66-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2688-67-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2688-74-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2128-81-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2128-80-0x0000000003B40000-0x0000000003C03000-memory.dmp modiloader_stage2 behavioral1/memory/2952-88-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2952-85-0x00000000038F0000-0x00000000039B3000-memory.dmp modiloader_stage2 behavioral1/memory/1152-95-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1152-92-0x0000000004D50000-0x0000000004E13000-memory.dmp modiloader_stage2 behavioral1/memory/1384-101-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1384-97-0x0000000003B60000-0x0000000003C23000-memory.dmp modiloader_stage2 behavioral1/memory/1776-108-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1948-115-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1948-113-0x0000000004F60000-0x0000000005023000-memory.dmp modiloader_stage2 behavioral1/memory/1948-112-0x0000000004F60000-0x0000000005023000-memory.dmp modiloader_stage2 behavioral1/memory/2420-118-0x00000000039D0000-0x0000000003A93000-memory.dmp modiloader_stage2 behavioral1/memory/2560-123-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2420-121-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2560-126-0x0000000004F70000-0x0000000005033000-memory.dmp modiloader_stage2 behavioral1/memory/2560-129-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/3048-136-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/588-137-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/588-143-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2364-148-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2484-152-0x0000000003CB0000-0x0000000003D73000-memory.dmp modiloader_stage2 behavioral1/memory/2484-156-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/112-159-0x0000000003AE0000-0x0000000003BA3000-memory.dmp modiloader_stage2 behavioral1/memory/112-161-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1640-162-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1504-164-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/556-165-0x0000000003A20000-0x0000000003AE3000-memory.dmp modiloader_stage2 behavioral1/memory/556-167-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1688-169-0x00000000039E0000-0x0000000003AA3000-memory.dmp modiloader_stage2 behavioral1/memory/1688-172-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2924-173-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1688-170-0x00000000039E0000-0x0000000003AA3000-memory.dmp modiloader_stage2 behavioral1/memory/2924-176-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2924-174-0x0000000003800000-0x00000000038C3000-memory.dmp modiloader_stage2 behavioral1/memory/2140-178-0x0000000003A20000-0x0000000003AE3000-memory.dmp modiloader_stage2 behavioral1/memory/2140-179-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2820-183-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2788-182-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2788-180-0x0000000003AE0000-0x0000000003BA3000-memory.dmp modiloader_stage2 behavioral1/memory/2820-184-0x0000000003AD0000-0x0000000003B93000-memory.dmp modiloader_stage2 behavioral1/memory/2820-186-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2592-188-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2592-187-0x0000000003AD0000-0x0000000003B93000-memory.dmp modiloader_stage2 behavioral1/memory/2708-189-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2708-191-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2676-196-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2676-194-0x0000000003AE0000-0x0000000003BA3000-memory.dmp modiloader_stage2 behavioral1/memory/2944-198-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/3000-201-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1748-205-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1268-204-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1748-207-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2000-210-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1064-213-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1020-215-0x00000000038A0000-0x0000000003963000-memory.dmp modiloader_stage2 behavioral1/memory/1020-216-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/1972-219-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2376-223-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 behavioral1/memory/2896-225-0x0000000000400000-0x00000000004C3000-memory.dmp modiloader_stage2 -
Executes dropped EXE 64 IoCs
pid Process 2256 Program.EXE 2940 Program1.EXE 2992 vssms32.exe 2688 vssms32.exe 2128 vssms32.exe 2952 vssms32.exe 1152 vssms32.exe 1384 vssms32.exe 1776 vssms32.exe 1948 vssms32.exe 2420 vssms32.exe 2560 vssms32.exe 3048 vssms32.exe 588 vssms32.exe 2364 vssms32.exe 2484 vssms32.exe 112 vssms32.exe 1640 vssms32.exe 1504 vssms32.exe 556 vssms32.exe 1688 vssms32.exe 2924 vssms32.exe 2140 vssms32.exe 2788 vssms32.exe 2820 vssms32.exe 2592 vssms32.exe 2708 vssms32.exe 2676 vssms32.exe 2944 vssms32.exe 3000 vssms32.exe 1268 vssms32.exe 1748 vssms32.exe 2000 vssms32.exe 1064 vssms32.exe 1020 vssms32.exe 1972 vssms32.exe 2376 vssms32.exe 2896 vssms32.exe 2108 vssms32.exe 608 vssms32.exe 2520 vssms32.exe 624 vssms32.exe 1368 vssms32.exe 1512 vssms32.exe 1480 vssms32.exe 1824 vssms32.exe 876 vssms32.exe 1576 vssms32.exe 1632 vssms32.exe 1684 vssms32.exe 2712 vssms32.exe 1664 vssms32.exe 2640 vssms32.exe 2976 vssms32.exe 2820 vssms32.exe 264 vssms32.exe 1376 vssms32.exe 2320 vssms32.exe 2032 vssms32.exe 2944 vssms32.exe 2972 vssms32.exe 236 vssms32.exe 308 vssms32.exe 2880 vssms32.exe -
Impair Defenses: Safe Mode Boot 1 TTPs 3 IoCs
description ioc Process Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\ProfSvc Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\Power Program.EXE Key deleted \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SafeBoot\Minimal\WinDefend Program.EXE -
Loads dropped DLL 64 IoCs
pid Process 2256 Program.EXE 2256 Program.EXE 2992 vssms32.exe 2992 vssms32.exe 2688 vssms32.exe 2688 vssms32.exe 2128 vssms32.exe 2128 vssms32.exe 2952 vssms32.exe 2952 vssms32.exe 1152 vssms32.exe 1152 vssms32.exe 1384 vssms32.exe 1384 vssms32.exe 1776 vssms32.exe 1776 vssms32.exe 1948 vssms32.exe 1948 vssms32.exe 2420 vssms32.exe 2420 vssms32.exe 2560 vssms32.exe 2560 vssms32.exe 3048 vssms32.exe 3048 vssms32.exe 588 vssms32.exe 588 vssms32.exe 2364 vssms32.exe 2364 vssms32.exe 2484 vssms32.exe 2484 vssms32.exe 112 vssms32.exe 112 vssms32.exe 1640 vssms32.exe 1640 vssms32.exe 1504 vssms32.exe 1504 vssms32.exe 556 vssms32.exe 556 vssms32.exe 1688 vssms32.exe 1688 vssms32.exe 2924 vssms32.exe 2924 vssms32.exe 2140 vssms32.exe 2140 vssms32.exe 2788 vssms32.exe 2788 vssms32.exe 2820 vssms32.exe 2820 vssms32.exe 2592 vssms32.exe 2592 vssms32.exe 2708 vssms32.exe 2708 vssms32.exe 2676 vssms32.exe 2676 vssms32.exe 2944 vssms32.exe 2944 vssms32.exe 3000 vssms32.exe 3000 vssms32.exe 1268 vssms32.exe 1268 vssms32.exe 1748 vssms32.exe 1748 vssms32.exe 2000 vssms32.exe 2000 vssms32.exe -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" Program.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\vssms32 = "C:\\Windows\\system32\\vssms32.exe" vssms32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe Program.EXE File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File created C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe File opened for modification C:\Windows\SysWOW64\vssms32.exe vssms32.exe -
resource yara_rule behavioral1/memory/2540-0-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/files/0x000b000000012263-5.dat upx behavioral1/memory/2540-16-0x0000000000400000-0x000000000040F000-memory.dmp upx behavioral1/memory/2256-19-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2256-53-0x00000000038A0000-0x0000000003963000-memory.dmp upx behavioral1/memory/2992-59-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2256-61-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2992-66-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2688-67-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2688-74-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2128-72-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2128-81-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1152-86-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2952-88-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1152-95-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1384-93-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1776-102-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1384-101-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1948-106-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1776-108-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1948-115-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2560-123-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2420-121-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3048-130-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2560-129-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3048-136-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/588-137-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2364-141-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/588-143-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2484-149-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2364-148-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2484-152-0x0000000003CB0000-0x0000000003D73000-memory.dmp upx behavioral1/memory/2484-156-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/112-155-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/112-159-0x0000000003AE0000-0x0000000003BA3000-memory.dmp upx behavioral1/memory/112-161-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1640-162-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1504-164-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/556-165-0x0000000003A20000-0x0000000003AE3000-memory.dmp upx behavioral1/memory/556-167-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1688-172-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2924-173-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1688-170-0x00000000039E0000-0x0000000003AA3000-memory.dmp upx behavioral1/memory/2924-176-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2140-178-0x0000000003A20000-0x0000000003AE3000-memory.dmp upx behavioral1/memory/2140-179-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2820-183-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2788-182-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2788-180-0x0000000003AE0000-0x0000000003BA3000-memory.dmp upx behavioral1/memory/2820-186-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2592-188-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2708-189-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2708-191-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2676-192-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2676-196-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3000-199-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2944-198-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1268-202-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/3000-201-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1748-205-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1268-204-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2000-208-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/1748-207-0x0000000000400000-0x00000000004C3000-memory.dmp upx behavioral1/memory/2000-210-0x0000000000400000-0x00000000004C3000-memory.dmp upx -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\winsxs Program1.EXE File opened for modification C:\Windows\addins Program1.EXE File opened for modification C:\Windows\es-ES Program1.EXE File opened for modification C:\Windows\PFRO.log Program1.EXE File opened for modification C:\Windows\Resources Program1.EXE File opened for modification C:\Windows\schemas Program1.EXE File opened for modification C:\Windows\Temp Program1.EXE File opened for modification C:\Windows\twain_32 Program1.EXE File opened for modification C:\Windows\Ultimate.xml Program1.EXE File created C:\Windows\Program.EXE e45765493caf8308294100c216f5276e_JaffaCakes118.exe File opened for modification C:\Windows\it-IT Program1.EXE File opened for modification C:\Windows\PLA Program1.EXE File opened for modification C:\Windows\SchCache Program1.EXE File opened for modification C:\Windows\ShellNew Program1.EXE File opened for modification C:\Windows\twain.dll Program1.EXE File opened for modification C:\Windows\Vss Program1.EXE File opened for modification C:\Windows\PolicyDefinitions Program1.EXE File opened for modification C:\Windows\security Program1.EXE File opened for modification C:\Windows\AppPatch Program1.EXE File opened for modification C:\Windows\debug Program1.EXE File opened for modification C:\Windows\inf Program1.EXE File opened for modification C:\Windows\ja-JP Program1.EXE File opened for modification C:\Windows\L2Schemas Program1.EXE File opened for modification C:\Windows\mib.bin Program1.EXE File opened for modification C:\Windows\SoftwareDistribution Program1.EXE File opened for modification C:\Windows\Fonts Program1.EXE File opened for modification C:\Windows\PCHEALTH Program1.EXE File opened for modification C:\Windows\TSSysprep.log Program1.EXE File opened for modification C:\Windows\WMSysPr9.prx Program1.EXE File created C:\Windows\Program1.EXE e45765493caf8308294100c216f5276e_JaffaCakes118.exe File opened for modification C:\Windows\Cursors Program1.EXE File opened for modification C:\Windows\fr-FR Program1.EXE File opened for modification C:\Windows\fveupdate.exe Program1.EXE File opened for modification C:\Windows\rescache Program1.EXE File opened for modification C:\Windows\ServiceProfiles Program1.EXE File opened for modification C:\Windows\Tasks Program1.EXE File opened for modification C:\Windows\bootstat.dat Program1.EXE File opened for modification C:\Windows\diagnostics Program1.EXE File opened for modification C:\Windows\notepad.exe Program1.EXE File opened for modification C:\Windows\Offline Web Pages Program1.EXE File opened for modification C:\Windows\Starter.xml Program1.EXE File opened for modification C:\Windows\system.ini Program1.EXE File opened for modification C:\Windows\twain_32.dll Program1.EXE File opened for modification C:\Windows\winhlp32.exe Program1.EXE File opened for modification C:\Windows\CSC Program1.EXE File opened for modification C:\Windows\Globalization Program1.EXE File opened for modification C:\Windows\Installer Program1.EXE File opened for modification C:\Windows\Media Program1.EXE File opened for modification C:\Windows\ModemLogs Program1.EXE File opened for modification C:\Windows\Speech Program1.EXE File opened for modification C:\Windows\BitLockerDiscoveryVolumeContents Program1.EXE File opened for modification C:\Windows\explorer.exe Program1.EXE File opened for modification C:\Windows\hh.exe Program1.EXE File opened for modification C:\Windows\Panther Program1.EXE File opened for modification C:\Windows\Prefetch Program1.EXE File opened for modification C:\Windows\Web Program1.EXE File opened for modification C:\Windows\bfsvc.exe Program1.EXE File opened for modification C:\Windows\IME Program1.EXE File opened for modification C:\Windows\setuperr.log Program1.EXE File opened for modification C:\Windows\TAPI Program1.EXE File opened for modification C:\Windows\de-DE Program1.EXE File opened for modification C:\Windows\DtcInstall.log Program1.EXE File opened for modification C:\Windows\Setup Program1.EXE File opened for modification C:\Windows\tracing Program1.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2980 2940 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Program.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e45765493caf8308294100c216f5276e_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Program1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vssms32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2540 wrote to memory of 2256 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2256 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2256 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2256 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 29 PID 2540 wrote to memory of 2940 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2940 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2940 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 30 PID 2540 wrote to memory of 2940 2540 e45765493caf8308294100c216f5276e_JaffaCakes118.exe 30 PID 2256 wrote to memory of 2992 2256 Program.EXE 31 PID 2256 wrote to memory of 2992 2256 Program.EXE 31 PID 2256 wrote to memory of 2992 2256 Program.EXE 31 PID 2256 wrote to memory of 2992 2256 Program.EXE 31 PID 2992 wrote to memory of 2688 2992 vssms32.exe 32 PID 2992 wrote to memory of 2688 2992 vssms32.exe 32 PID 2992 wrote to memory of 2688 2992 vssms32.exe 32 PID 2992 wrote to memory of 2688 2992 vssms32.exe 32 PID 2688 wrote to memory of 2128 2688 vssms32.exe 33 PID 2688 wrote to memory of 2128 2688 vssms32.exe 33 PID 2688 wrote to memory of 2128 2688 vssms32.exe 33 PID 2688 wrote to memory of 2128 2688 vssms32.exe 33 PID 2128 wrote to memory of 2952 2128 vssms32.exe 34 PID 2128 wrote to memory of 2952 2128 vssms32.exe 34 PID 2128 wrote to memory of 2952 2128 vssms32.exe 34 PID 2128 wrote to memory of 2952 2128 vssms32.exe 34 PID 2940 wrote to memory of 2980 2940 Program1.EXE 35 PID 2940 wrote to memory of 2980 2940 Program1.EXE 35 PID 2940 wrote to memory of 2980 2940 Program1.EXE 35 PID 2940 wrote to memory of 2980 2940 Program1.EXE 35 PID 2952 wrote to memory of 1152 2952 vssms32.exe 36 PID 2952 wrote to memory of 1152 2952 vssms32.exe 36 PID 2952 wrote to memory of 1152 2952 vssms32.exe 36 PID 2952 wrote to memory of 1152 2952 vssms32.exe 36 PID 1152 wrote to memory of 1384 1152 vssms32.exe 37 PID 1152 wrote to memory of 1384 1152 vssms32.exe 37 PID 1152 wrote to memory of 1384 1152 vssms32.exe 37 PID 1152 wrote to memory of 1384 1152 vssms32.exe 37 PID 1384 wrote to memory of 1776 1384 vssms32.exe 38 PID 1384 wrote to memory of 1776 1384 vssms32.exe 38 PID 1384 wrote to memory of 1776 1384 vssms32.exe 38 PID 1384 wrote to memory of 1776 1384 vssms32.exe 38 PID 1776 wrote to memory of 1948 1776 vssms32.exe 39 PID 1776 wrote to memory of 1948 1776 vssms32.exe 39 PID 1776 wrote to memory of 1948 1776 vssms32.exe 39 PID 1776 wrote to memory of 1948 1776 vssms32.exe 39 PID 1948 wrote to memory of 2420 1948 vssms32.exe 40 PID 1948 wrote to memory of 2420 1948 vssms32.exe 40 PID 1948 wrote to memory of 2420 1948 vssms32.exe 40 PID 1948 wrote to memory of 2420 1948 vssms32.exe 40 PID 2420 wrote to memory of 2560 2420 vssms32.exe 41 PID 2420 wrote to memory of 2560 2420 vssms32.exe 41 PID 2420 wrote to memory of 2560 2420 vssms32.exe 41 PID 2420 wrote to memory of 2560 2420 vssms32.exe 41 PID 2560 wrote to memory of 3048 2560 vssms32.exe 42 PID 2560 wrote to memory of 3048 2560 vssms32.exe 42 PID 2560 wrote to memory of 3048 2560 vssms32.exe 42 PID 2560 wrote to memory of 3048 2560 vssms32.exe 42 PID 3048 wrote to memory of 588 3048 vssms32.exe 43 PID 3048 wrote to memory of 588 3048 vssms32.exe 43 PID 3048 wrote to memory of 588 3048 vssms32.exe 43 PID 3048 wrote to memory of 588 3048 vssms32.exe 43 PID 588 wrote to memory of 2364 588 vssms32.exe 44 PID 588 wrote to memory of 2364 588 vssms32.exe 44 PID 588 wrote to memory of 2364 588 vssms32.exe 44 PID 588 wrote to memory of 2364 588 vssms32.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\e45765493caf8308294100c216f5276e_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e45765493caf8308294100c216f5276e_JaffaCakes118.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2540 -
C:\Windows\Program.EXE"C:\Windows\Program.EXE"2⤵
- Executes dropped EXE
- Impair Defenses: Safe Mode Boot
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"9⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2364 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2484 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:112 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1640 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:556 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"21⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:1688 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2924 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2788 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2820 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
PID:2592 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"27⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2708 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2676 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3000 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1268 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
PID:1748 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"33⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2000 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"34⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1064 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"35⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1020 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"36⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2376 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"38⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2896 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"39⤵
- Executes dropped EXE
PID:2108 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"40⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:608 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"41⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2520 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"42⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:624 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"43⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1512 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"45⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1480 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"46⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1824 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"47⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:876 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"48⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1576 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1632 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"50⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1684 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"51⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2712 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"52⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1664 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"53⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2640 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"54⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2976 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"55⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2820 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"56⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"57⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1376 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"58⤵
- Executes dropped EXE
- Adds Run key to start application
PID:2320 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"59⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
PID:2032 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"60⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2944 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"61⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2972 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"62⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:236 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"63⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:308 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"64⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2880 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"65⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"66⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:1064 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"67⤵
- Drops file in System32 directory
PID:1952 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"68⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1972 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"69⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2368 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"70⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1916 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"71⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"72⤵
- Adds Run key to start application
PID:2196 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"73⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1548 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"74⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:2164 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"75⤵
- Drops file in System32 directory
PID:1340 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"76⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:604 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"77⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1744 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"78⤵
- Drops file in System32 directory
PID:2504 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"79⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:868 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"80⤵
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:1572 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"81⤵
- System Location Discovery: System Language Discovery
PID:2052 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"82⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2540 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"83⤵
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:3012 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"84⤵
- Adds Run key to start application
- Drops file in System32 directory
PID:2908 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"85⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2140 -
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"86⤵PID:2812
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"87⤵PID:2800
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"88⤵PID:2592
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"89⤵PID:2476
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"90⤵PID:1676
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"91⤵PID:1616
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"92⤵PID:2032
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"93⤵PID:1732
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"94⤵PID:2024
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"95⤵PID:924
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"96⤵PID:1032
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"97⤵PID:1980
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"98⤵PID:1020
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"99⤵PID:2452
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"100⤵PID:2580
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"101⤵PID:2088
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"102⤵PID:2112
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"103⤵PID:1736
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"104⤵PID:832
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"105⤵PID:1140
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"106⤵PID:588
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"107⤵PID:2472
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"108⤵PID:2184
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"109⤵PID:936
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"110⤵PID:1340
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"111⤵PID:604
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"112⤵PID:1512
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"113⤵PID:1212
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"114⤵PID:1504
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"115⤵PID:2416
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"116⤵PID:2384
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"117⤵PID:2468
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"118⤵PID:2856
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"119⤵PID:3024
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"120⤵PID:2772
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"121⤵PID:2836
-
C:\Windows\SysWOW64\vssms32.exe"C:\Windows\system32\vssms32.exe"122⤵PID:2692
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-