Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
16-12-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe
-
Size
252KB
-
MD5
f7322adb60f972551f5a9f734bd5c7d6
-
SHA1
c0c2b4265f8d15c8633b7997e9e7707e2a598a9d
-
SHA256
e13764038fea1ad1225327008eb2a7aeeba2e480c522e4aa17b337a4ebb93b14
-
SHA512
f2cef0046da12732cbd33a935554e34caef19d6052a7b9fced36419e98ddab3d7c00f54d053c73efe304744b84d8bc658ec3856af61fea7509cdc354f6144b92
-
SSDEEP
6144:Ec2VOAX4tfZ7u0NuTnTc6ruy3QM4p+vChSY0wc9ngk42ylCW:p2J4tB7u0NATcO3QM4p/EY0xJ42yl
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2800 quickp32.exe -
Executes dropped EXE 57 IoCs
pid Process 2800 quickp32.exe 2612 quickp32.exe 860 quickp32.exe 2636 quickp32.exe 1660 quickp32.exe 1676 quickp32.exe 2216 quickp32.exe 2184 quickp32.exe 2440 quickp32.exe 2304 quickp32.exe 2064 quickp32.exe 2260 quickp32.exe 1128 quickp32.exe 880 quickp32.exe 2356 quickp32.exe 2020 quickp32.exe 2604 quickp32.exe 3048 quickp32.exe 2312 quickp32.exe 1008 quickp32.exe 1160 quickp32.exe 380 quickp32.exe 1660 quickp32.exe 2680 quickp32.exe 2792 quickp32.exe 2828 quickp32.exe 2464 quickp32.exe 2664 quickp32.exe 3060 quickp32.exe 2764 quickp32.exe 2248 quickp32.exe 2520 quickp32.exe 1564 quickp32.exe 2276 quickp32.exe 2632 quickp32.exe 3008 quickp32.exe 2808 quickp32.exe 2448 quickp32.exe 820 quickp32.exe 2452 quickp32.exe 320 quickp32.exe 2520 quickp32.exe 2752 quickp32.exe 2276 quickp32.exe 2596 quickp32.exe 3024 quickp32.exe 2584 quickp32.exe 2192 quickp32.exe 2124 quickp32.exe 1784 quickp32.exe 924 quickp32.exe 1808 quickp32.exe 2264 quickp32.exe 636 quickp32.exe 2632 quickp32.exe 2904 quickp32.exe 2400 quickp32.exe -
Loads dropped DLL 64 IoCs
pid Process 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 2800 quickp32.exe 2800 quickp32.exe 2612 quickp32.exe 2612 quickp32.exe 860 quickp32.exe 860 quickp32.exe 2636 quickp32.exe 2636 quickp32.exe 1660 quickp32.exe 1660 quickp32.exe 1676 quickp32.exe 1676 quickp32.exe 2216 quickp32.exe 2216 quickp32.exe 2184 quickp32.exe 2184 quickp32.exe 2440 quickp32.exe 2440 quickp32.exe 2304 quickp32.exe 2304 quickp32.exe 2064 quickp32.exe 2064 quickp32.exe 2260 quickp32.exe 2260 quickp32.exe 1128 quickp32.exe 1128 quickp32.exe 880 quickp32.exe 880 quickp32.exe 2356 quickp32.exe 2356 quickp32.exe 2020 quickp32.exe 2020 quickp32.exe 2604 quickp32.exe 2604 quickp32.exe 3048 quickp32.exe 3048 quickp32.exe 2312 quickp32.exe 2312 quickp32.exe 1008 quickp32.exe 1008 quickp32.exe 1160 quickp32.exe 1160 quickp32.exe 380 quickp32.exe 380 quickp32.exe 1660 quickp32.exe 1660 quickp32.exe 2680 quickp32.exe 2680 quickp32.exe 2792 quickp32.exe 2792 quickp32.exe 2828 quickp32.exe 2828 quickp32.exe 2464 quickp32.exe 2464 quickp32.exe 2664 quickp32.exe 2664 quickp32.exe 3060 quickp32.exe 3060 quickp32.exe 2764 quickp32.exe 2764 quickp32.exe 2248 quickp32.exe 2248 quickp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 quickp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 57 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe -
Suspicious behavior: EnumeratesProcesses 58 IoCs
pid Process 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 2800 quickp32.exe 2612 quickp32.exe 860 quickp32.exe 2636 quickp32.exe 1660 quickp32.exe 1676 quickp32.exe 2216 quickp32.exe 2184 quickp32.exe 2440 quickp32.exe 2304 quickp32.exe 2064 quickp32.exe 2260 quickp32.exe 1128 quickp32.exe 880 quickp32.exe 2356 quickp32.exe 2020 quickp32.exe 2604 quickp32.exe 3048 quickp32.exe 2312 quickp32.exe 1008 quickp32.exe 1160 quickp32.exe 380 quickp32.exe 1660 quickp32.exe 2680 quickp32.exe 2792 quickp32.exe 2828 quickp32.exe 2464 quickp32.exe 2664 quickp32.exe 3060 quickp32.exe 2764 quickp32.exe 2248 quickp32.exe 2520 quickp32.exe 1564 quickp32.exe 2276 quickp32.exe 2632 quickp32.exe 3008 quickp32.exe 2808 quickp32.exe 2448 quickp32.exe 820 quickp32.exe 2452 quickp32.exe 320 quickp32.exe 2520 quickp32.exe 2752 quickp32.exe 2276 quickp32.exe 2596 quickp32.exe 3024 quickp32.exe 2584 quickp32.exe 2192 quickp32.exe 2124 quickp32.exe 1784 quickp32.exe 924 quickp32.exe 1808 quickp32.exe 2264 quickp32.exe 636 quickp32.exe 2632 quickp32.exe 2904 quickp32.exe 2400 quickp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3008 wrote to memory of 2800 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2800 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2800 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 30 PID 3008 wrote to memory of 2800 3008 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 30 PID 2800 wrote to memory of 2612 2800 quickp32.exe 32 PID 2800 wrote to memory of 2612 2800 quickp32.exe 32 PID 2800 wrote to memory of 2612 2800 quickp32.exe 32 PID 2800 wrote to memory of 2612 2800 quickp32.exe 32 PID 2612 wrote to memory of 860 2612 quickp32.exe 33 PID 2612 wrote to memory of 860 2612 quickp32.exe 33 PID 2612 wrote to memory of 860 2612 quickp32.exe 33 PID 2612 wrote to memory of 860 2612 quickp32.exe 33 PID 860 wrote to memory of 2636 860 quickp32.exe 34 PID 860 wrote to memory of 2636 860 quickp32.exe 34 PID 860 wrote to memory of 2636 860 quickp32.exe 34 PID 860 wrote to memory of 2636 860 quickp32.exe 34 PID 2636 wrote to memory of 1660 2636 quickp32.exe 35 PID 2636 wrote to memory of 1660 2636 quickp32.exe 35 PID 2636 wrote to memory of 1660 2636 quickp32.exe 35 PID 2636 wrote to memory of 1660 2636 quickp32.exe 35 PID 1660 wrote to memory of 1676 1660 quickp32.exe 36 PID 1660 wrote to memory of 1676 1660 quickp32.exe 36 PID 1660 wrote to memory of 1676 1660 quickp32.exe 36 PID 1660 wrote to memory of 1676 1660 quickp32.exe 36 PID 1676 wrote to memory of 2216 1676 quickp32.exe 37 PID 1676 wrote to memory of 2216 1676 quickp32.exe 37 PID 1676 wrote to memory of 2216 1676 quickp32.exe 37 PID 1676 wrote to memory of 2216 1676 quickp32.exe 37 PID 2216 wrote to memory of 2184 2216 quickp32.exe 38 PID 2216 wrote to memory of 2184 2216 quickp32.exe 38 PID 2216 wrote to memory of 2184 2216 quickp32.exe 38 PID 2216 wrote to memory of 2184 2216 quickp32.exe 38 PID 2184 wrote to memory of 2440 2184 quickp32.exe 39 PID 2184 wrote to memory of 2440 2184 quickp32.exe 39 PID 2184 wrote to memory of 2440 2184 quickp32.exe 39 PID 2184 wrote to memory of 2440 2184 quickp32.exe 39 PID 2440 wrote to memory of 2304 2440 quickp32.exe 40 PID 2440 wrote to memory of 2304 2440 quickp32.exe 40 PID 2440 wrote to memory of 2304 2440 quickp32.exe 40 PID 2440 wrote to memory of 2304 2440 quickp32.exe 40 PID 2304 wrote to memory of 2064 2304 quickp32.exe 41 PID 2304 wrote to memory of 2064 2304 quickp32.exe 41 PID 2304 wrote to memory of 2064 2304 quickp32.exe 41 PID 2304 wrote to memory of 2064 2304 quickp32.exe 41 PID 2064 wrote to memory of 2260 2064 quickp32.exe 42 PID 2064 wrote to memory of 2260 2064 quickp32.exe 42 PID 2064 wrote to memory of 2260 2064 quickp32.exe 42 PID 2064 wrote to memory of 2260 2064 quickp32.exe 42 PID 2260 wrote to memory of 1128 2260 quickp32.exe 43 PID 2260 wrote to memory of 1128 2260 quickp32.exe 43 PID 2260 wrote to memory of 1128 2260 quickp32.exe 43 PID 2260 wrote to memory of 1128 2260 quickp32.exe 43 PID 1128 wrote to memory of 880 1128 quickp32.exe 44 PID 1128 wrote to memory of 880 1128 quickp32.exe 44 PID 1128 wrote to memory of 880 1128 quickp32.exe 44 PID 1128 wrote to memory of 880 1128 quickp32.exe 44 PID 880 wrote to memory of 2356 880 quickp32.exe 45 PID 880 wrote to memory of 2356 880 quickp32.exe 45 PID 880 wrote to memory of 2356 880 quickp32.exe 45 PID 880 wrote to memory of 2356 880 quickp32.exe 45 PID 2356 wrote to memory of 2020 2356 quickp32.exe 46 PID 2356 wrote to memory of 2020 2356 quickp32.exe 46 PID 2356 wrote to memory of 2020 2356 quickp32.exe 46 PID 2356 wrote to memory of 2020 2356 quickp32.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Users\Admin\AppData\Local\Temp\F7322A~1.EXE2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1676 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2440 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:880 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2020 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2604 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3048 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2312 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1008 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1160 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:380 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1660 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2680 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2792 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2828 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2664 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3060 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2764 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2248 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe33⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe34⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1564 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe35⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe36⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe37⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3008 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe38⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2808 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe39⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2448 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe40⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:820 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe41⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2452 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe42⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:320 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe43⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2520 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe44⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe45⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe46⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2596 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3024 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe48⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2584 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2124 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe51⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1784 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe52⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:924 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe53⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1808 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe54⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2264 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe55⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:636 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe56⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2632 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe57⤵
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2904 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe58⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2400
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5f7322adb60f972551f5a9f734bd5c7d6
SHA1c0c2b4265f8d15c8633b7997e9e7707e2a598a9d
SHA256e13764038fea1ad1225327008eb2a7aeeba2e480c522e4aa17b337a4ebb93b14
SHA512f2cef0046da12732cbd33a935554e34caef19d6052a7b9fced36419e98ddab3d7c00f54d053c73efe304744b84d8bc658ec3856af61fea7509cdc354f6144b92