Analysis
-
max time kernel
36s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-12-2024 00:05
Static task
static1
Behavioral task
behavioral1
Sample
e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe
-
Size
292KB
-
MD5
e8eca1a24d0eb575beb2dc01b6d01b64
-
SHA1
a1f389cd0b9488685316462ccef24b6e972dda05
-
SHA256
e82b397c6cb9555caeb62448771c6c2d1c1faee6969041bdca06e9b2eb1c087c
-
SHA512
b65e589c4d60c69c08e29a65bc55f0b648bae209afbb422246554b8cb516699a2757a4abeea79111307c3657839b676a2384077980701935a14e8b474f7e02fa
-
SSDEEP
6144:2DdmAid3w4AsdOty/2gfazN1qNsGoMbMESRzDKgI88/nLd:CEAidw4AS3/7fkb4oM4EADv8/nLd
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
Modiloader family
-
ModiLoader Second Stage 11 IoCs
resource yara_rule behavioral1/memory/2764-55-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-51-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-50-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-48-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-44-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-42-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-40-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-38-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2764-65-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/1656-130-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 behavioral1/memory/2940-180-0x0000000000400000-0x000000000042B000-memory.dmp modiloader_stage2 -
Deletes itself 1 IoCs
pid Process 2692 cmd.exe -
Executes dropped EXE 64 IoCs
pid Process 2816 cgi-bin.exe 2764 cgi-bin.exe 3008 server.exe 2664 cgi-bin.exe 1656 cgi-bin.exe 1976 server.exe 1084 cgi-bin.exe 2940 cgi-bin.exe 1304 server.exe 700 cgi-bin.exe 2344 cgi-bin.exe 2064 server.exe 1752 cgi-bin.exe 2136 cgi-bin.exe 2604 server.exe 2600 cgi-bin.exe 1428 cgi-bin.exe 2752 server.exe 3008 cgi-bin.exe 1968 cgi-bin.exe 596 server.exe 1928 cgi-bin.exe 1236 cgi-bin.exe 1648 server.exe 2108 cgi-bin.exe 1816 cgi-bin.exe 2356 server.exe 2028 cgi-bin.exe 2700 cgi-bin.exe 2572 server.exe 2348 cgi-bin.exe 2140 cgi-bin.exe 1120 server.exe 2832 cgi-bin.exe 1400 cgi-bin.exe 1740 server.exe 2116 cgi-bin.exe 1984 cgi-bin.exe 1928 server.exe 2144 cgi-bin.exe 1356 cgi-bin.exe 1796 server.exe 1328 cgi-bin.exe 1748 cgi-bin.exe 2728 server.exe 2616 cgi-bin.exe 2584 cgi-bin.exe 576 server.exe 292 cgi-bin.exe 2072 cgi-bin.exe 784 server.exe 1660 cgi-bin.exe 1604 cgi-bin.exe 1812 server.exe 2328 cgi-bin.exe 2392 cgi-bin.exe 2456 server.exe 2840 cgi-bin.exe 1440 cgi-bin.exe 1680 server.exe 1336 cgi-bin.exe 2736 cgi-bin.exe 2428 server.exe 1616 cgi-bin.exe -
Loads dropped DLL 64 IoCs
pid Process 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 2816 cgi-bin.exe 3008 server.exe 3008 server.exe 2664 cgi-bin.exe 1656 cgi-bin.exe 1656 cgi-bin.exe 1976 server.exe 1976 server.exe 1084 cgi-bin.exe 2940 cgi-bin.exe 1304 server.exe 1304 server.exe 700 cgi-bin.exe 2344 cgi-bin.exe 2064 server.exe 2064 server.exe 1752 cgi-bin.exe 2136 cgi-bin.exe 2604 server.exe 2604 server.exe 2600 cgi-bin.exe 1428 cgi-bin.exe 2752 server.exe 2752 server.exe 3008 cgi-bin.exe 1968 cgi-bin.exe 596 server.exe 596 server.exe 1928 cgi-bin.exe 1236 cgi-bin.exe 1648 server.exe 1648 server.exe 2108 cgi-bin.exe 1816 cgi-bin.exe 2356 server.exe 2356 server.exe 2028 cgi-bin.exe 2700 cgi-bin.exe 2572 server.exe 2572 server.exe 2348 cgi-bin.exe 2140 cgi-bin.exe 1120 server.exe 1120 server.exe 2832 cgi-bin.exe 1400 cgi-bin.exe 1740 server.exe 1740 server.exe 2116 cgi-bin.exe 1984 cgi-bin.exe 1928 server.exe 1928 server.exe 2144 cgi-bin.exe 1356 cgi-bin.exe 1796 server.exe 1796 server.exe 1328 cgi-bin.exe 1748 cgi-bin.exe 2728 server.exe 2728 server.exe 2616 cgi-bin.exe 2584 cgi-bin.exe -
Suspicious use of SetThreadContext 27 IoCs
description pid Process procid_target PID 2816 set thread context of 2764 2816 cgi-bin.exe 33 PID 2664 set thread context of 1656 2664 cgi-bin.exe 38 PID 1084 set thread context of 2940 1084 cgi-bin.exe 43 PID 700 set thread context of 2344 700 cgi-bin.exe 48 PID 1752 set thread context of 2136 1752 cgi-bin.exe 53 PID 2600 set thread context of 1428 2600 cgi-bin.exe 58 PID 3008 set thread context of 1968 3008 cgi-bin.exe 63 PID 1928 set thread context of 1236 1928 cgi-bin.exe 68 PID 2108 set thread context of 1816 2108 cgi-bin.exe 73 PID 2028 set thread context of 2700 2028 cgi-bin.exe 78 PID 2348 set thread context of 2140 2348 cgi-bin.exe 83 PID 2832 set thread context of 1400 2832 cgi-bin.exe 88 PID 2116 set thread context of 1984 2116 cgi-bin.exe 93 PID 2144 set thread context of 1356 2144 cgi-bin.exe 98 PID 1328 set thread context of 1748 1328 cgi-bin.exe 103 PID 2616 set thread context of 2584 2616 cgi-bin.exe 108 PID 292 set thread context of 2072 292 cgi-bin.exe 113 PID 1660 set thread context of 1604 1660 cgi-bin.exe 193 PID 2328 set thread context of 2392 2328 cgi-bin.exe 123 PID 2840 set thread context of 1440 2840 cgi-bin.exe 128 PID 1336 set thread context of 2736 1336 cgi-bin.exe 133 PID 1616 set thread context of 3012 1616 cgi-bin.exe 138 PID 1264 set thread context of 2876 1264 cgi-bin.exe 143 PID 1416 set thread context of 1956 1416 cgi-bin.exe 148 PID 1948 set thread context of 2464 1948 cgi-bin.exe 153 PID 3004 set thread context of 2616 3004 cgi-bin.exe 158 PID 812 set thread context of 1952 812 cgi-bin.exe 163 -
Drops file in Windows directory 28 IoCs
description ioc Process File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File opened for modification C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe File created C:\Windows\server.exe cgi-bin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language server.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cgi-bin.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1656 cgi-bin.exe 2940 cgi-bin.exe 2344 cgi-bin.exe 2136 cgi-bin.exe 1428 cgi-bin.exe 1968 cgi-bin.exe 1236 cgi-bin.exe 1816 cgi-bin.exe 2700 cgi-bin.exe 2140 cgi-bin.exe 1400 cgi-bin.exe 1984 cgi-bin.exe 1356 cgi-bin.exe 1748 cgi-bin.exe 2584 cgi-bin.exe 2072 cgi-bin.exe 1604 cgi-bin.exe 2392 cgi-bin.exe 1440 cgi-bin.exe 2736 cgi-bin.exe 3012 cgi-bin.exe 2876 cgi-bin.exe 1956 cgi-bin.exe 2464 cgi-bin.exe 2616 cgi-bin.exe 1952 cgi-bin.exe -
Suspicious use of AdjustPrivilegeToken 54 IoCs
description pid Process Token: SeDebugPrivilege 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe Token: SeDebugPrivilege 2816 cgi-bin.exe Token: SeDebugPrivilege 3008 server.exe Token: SeDebugPrivilege 2664 cgi-bin.exe Token: SeDebugPrivilege 1976 server.exe Token: SeDebugPrivilege 1084 cgi-bin.exe Token: SeDebugPrivilege 1304 server.exe Token: SeDebugPrivilege 700 cgi-bin.exe Token: SeDebugPrivilege 2064 server.exe Token: SeDebugPrivilege 1752 cgi-bin.exe Token: SeDebugPrivilege 2604 server.exe Token: SeDebugPrivilege 2600 cgi-bin.exe Token: SeDebugPrivilege 2752 server.exe Token: SeDebugPrivilege 3008 cgi-bin.exe Token: SeDebugPrivilege 596 server.exe Token: SeDebugPrivilege 1928 cgi-bin.exe Token: SeDebugPrivilege 1648 server.exe Token: SeDebugPrivilege 2108 cgi-bin.exe Token: SeDebugPrivilege 2356 server.exe Token: SeDebugPrivilege 2028 cgi-bin.exe Token: SeDebugPrivilege 2572 server.exe Token: SeDebugPrivilege 2348 cgi-bin.exe Token: SeDebugPrivilege 1120 server.exe Token: SeDebugPrivilege 2832 cgi-bin.exe Token: SeDebugPrivilege 1740 server.exe Token: SeDebugPrivilege 2116 cgi-bin.exe Token: SeDebugPrivilege 1928 server.exe Token: SeDebugPrivilege 2144 cgi-bin.exe Token: SeDebugPrivilege 1796 server.exe Token: SeDebugPrivilege 1328 cgi-bin.exe Token: SeDebugPrivilege 2728 server.exe Token: SeDebugPrivilege 2616 cgi-bin.exe Token: SeDebugPrivilege 576 server.exe Token: SeDebugPrivilege 292 cgi-bin.exe Token: SeDebugPrivilege 784 server.exe Token: SeDebugPrivilege 1660 cgi-bin.exe Token: SeDebugPrivilege 1812 server.exe Token: SeDebugPrivilege 2328 cgi-bin.exe Token: SeDebugPrivilege 2456 server.exe Token: SeDebugPrivilege 2840 cgi-bin.exe Token: SeDebugPrivilege 1680 server.exe Token: SeDebugPrivilege 1336 cgi-bin.exe Token: SeDebugPrivilege 2428 server.exe Token: SeDebugPrivilege 1616 cgi-bin.exe Token: SeDebugPrivilege 572 server.exe Token: SeDebugPrivilege 1264 cgi-bin.exe Token: SeDebugPrivilege 2468 server.exe Token: SeDebugPrivilege 1416 cgi-bin.exe Token: SeDebugPrivilege 1720 server.exe Token: SeDebugPrivilege 1948 cgi-bin.exe Token: SeDebugPrivilege 2692 server.exe Token: SeDebugPrivilege 3004 cgi-bin.exe Token: SeDebugPrivilege 1048 server.exe Token: SeDebugPrivilege 812 cgi-bin.exe -
Suspicious use of SetWindowsHookEx 54 IoCs
pid Process 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 2816 cgi-bin.exe 3008 server.exe 2664 cgi-bin.exe 1976 server.exe 1084 cgi-bin.exe 1304 server.exe 700 cgi-bin.exe 2064 server.exe 1752 cgi-bin.exe 2604 server.exe 2600 cgi-bin.exe 2752 server.exe 3008 cgi-bin.exe 596 server.exe 1928 cgi-bin.exe 1648 server.exe 2108 cgi-bin.exe 2356 server.exe 2028 cgi-bin.exe 2572 server.exe 2348 cgi-bin.exe 1120 server.exe 2832 cgi-bin.exe 1740 server.exe 2116 cgi-bin.exe 1928 server.exe 2144 cgi-bin.exe 1796 server.exe 1328 cgi-bin.exe 2728 server.exe 2616 cgi-bin.exe 576 server.exe 292 cgi-bin.exe 784 server.exe 1660 cgi-bin.exe 1812 server.exe 2328 cgi-bin.exe 2456 server.exe 2840 cgi-bin.exe 1680 server.exe 1336 cgi-bin.exe 2428 server.exe 1616 cgi-bin.exe 572 server.exe 1264 cgi-bin.exe 2468 server.exe 1416 cgi-bin.exe 1720 server.exe 1948 cgi-bin.exe 2692 server.exe 3004 cgi-bin.exe 1048 server.exe 812 cgi-bin.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2112 wrote to memory of 2816 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2816 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2816 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2816 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 30 PID 2112 wrote to memory of 2692 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2692 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2692 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 31 PID 2112 wrote to memory of 2692 2112 e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe 31 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2816 wrote to memory of 2764 2816 cgi-bin.exe 33 PID 2764 wrote to memory of 3008 2764 cgi-bin.exe 34 PID 2764 wrote to memory of 3008 2764 cgi-bin.exe 34 PID 2764 wrote to memory of 3008 2764 cgi-bin.exe 34 PID 2764 wrote to memory of 3008 2764 cgi-bin.exe 34 PID 3008 wrote to memory of 2664 3008 server.exe 35 PID 3008 wrote to memory of 2664 3008 server.exe 35 PID 3008 wrote to memory of 2664 3008 server.exe 35 PID 3008 wrote to memory of 2664 3008 server.exe 35 PID 3008 wrote to memory of 2368 3008 server.exe 36 PID 3008 wrote to memory of 2368 3008 server.exe 36 PID 3008 wrote to memory of 2368 3008 server.exe 36 PID 3008 wrote to memory of 2368 3008 server.exe 36 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 2664 wrote to memory of 1656 2664 cgi-bin.exe 38 PID 1656 wrote to memory of 1976 1656 cgi-bin.exe 39 PID 1656 wrote to memory of 1976 1656 cgi-bin.exe 39 PID 1656 wrote to memory of 1976 1656 cgi-bin.exe 39 PID 1656 wrote to memory of 1976 1656 cgi-bin.exe 39 PID 1976 wrote to memory of 1084 1976 server.exe 40 PID 1976 wrote to memory of 1084 1976 server.exe 40 PID 1976 wrote to memory of 1084 1976 server.exe 40 PID 1976 wrote to memory of 1084 1976 server.exe 40 PID 1976 wrote to memory of 2392 1976 server.exe 41 PID 1976 wrote to memory of 2392 1976 server.exe 41 PID 1976 wrote to memory of 2392 1976 server.exe 41 PID 1976 wrote to memory of 2392 1976 server.exe 41 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43 PID 1084 wrote to memory of 2940 1084 cgi-bin.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e8eca1a24d0eb575beb2dc01b6d01b64_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe3⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\server.exe"C:\Windows\server.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1976 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1084 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2940 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1428 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:596 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1236 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1816 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2700 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe33⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2140 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"35⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe36⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1400 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"37⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1740 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe39⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1984 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"41⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe42⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1356 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"43⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1328 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe45⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1748 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"46⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"47⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe48⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:576 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"50⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe51⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2072 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"52⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:784 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe54⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1604 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"55⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"56⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2328 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe57⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2392 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"58⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe60⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"61⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"62⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1336 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe63⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2736 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"64⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe66⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:3012 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"67⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"68⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe69⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2876 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"70⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"71⤵
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe72⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:1956 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"73⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"74⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe75⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"76⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"77⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3004 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe78⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2616 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"79⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1048 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"80⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:812 -
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe81⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1952 -
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"82⤵PID:2076
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"83⤵PID:2648
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe84⤵PID:2284
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"85⤵PID:2060
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"86⤵PID:2992
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe87⤵PID:1416
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"88⤵PID:872
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"89⤵PID:896
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe90⤵PID:2836
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"91⤵PID:1680
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"92⤵PID:800
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe193⤵PID:1564
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"94⤵PID:1992
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"95⤵PID:1972
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe96⤵PID:2340
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"97⤵PID:660
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"98⤵PID:296
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe99⤵PID:1604
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"100⤵PID:1792
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"101⤵PID:2052
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe102⤵PID:2708
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"103⤵PID:2572
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"104⤵PID:2236
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe105⤵PID:2504
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"106⤵PID:1980
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"107⤵PID:2348
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe108⤵PID:2624
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"109⤵PID:2892
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"110⤵PID:1516
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe111⤵PID:2920
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"112⤵PID:2676
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"113⤵PID:1724
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe114⤵PID:3048
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"115⤵PID:2540
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"116⤵PID:2992
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe117⤵PID:1028
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"118⤵PID:2036
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"119⤵PID:1328
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe" c:\users\admin\appdata\local\temp\cgi-bin.exe120⤵PID:2728
-
C:\Users\Admin\AppData\Roaming\server.exe"C:\Users\Admin\AppData\Roaming\server.exe"121⤵PID:1336
-
C:\Users\Admin\appdata\local\temp\cgi-bin.exe"C:\Users\Admin\appdata\local\temp\cgi-bin.exe"122⤵PID:616
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-