Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
16-12-2024 04:00
Static task
static1
Behavioral task
behavioral1
Sample
f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe
-
Size
252KB
-
MD5
f7322adb60f972551f5a9f734bd5c7d6
-
SHA1
c0c2b4265f8d15c8633b7997e9e7707e2a598a9d
-
SHA256
e13764038fea1ad1225327008eb2a7aeeba2e480c522e4aa17b337a4ebb93b14
-
SHA512
f2cef0046da12732cbd33a935554e34caef19d6052a7b9fced36419e98ddab3d7c00f54d053c73efe304744b84d8bc658ec3856af61fea7509cdc354f6144b92
-
SSDEEP
6144:Ec2VOAX4tfZ7u0NuTnTc6ruy3QM4p+vChSY0wc9ngk42ylCW:p2J4tB7u0NATcO3QM4p/EY0xJ42yl
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Checks computer location settings 2 TTPs 49 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe Key value queried \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\International\Geo\Nation quickp32.exe -
Deletes itself 1 IoCs
pid Process 1820 quickp32.exe -
Executes dropped EXE 49 IoCs
pid Process 1820 quickp32.exe 3900 quickp32.exe 4968 quickp32.exe 4976 quickp32.exe 1280 quickp32.exe 872 quickp32.exe 3336 quickp32.exe 3804 quickp32.exe 3228 quickp32.exe 3096 quickp32.exe 2900 quickp32.exe 2904 quickp32.exe 2348 quickp32.exe 2928 quickp32.exe 1012 quickp32.exe 2044 quickp32.exe 1448 quickp32.exe 2324 quickp32.exe 4532 quickp32.exe 2932 quickp32.exe 4956 quickp32.exe 1588 quickp32.exe 4356 quickp32.exe 2136 quickp32.exe 460 quickp32.exe 4292 quickp32.exe 3420 quickp32.exe 4564 quickp32.exe 3772 quickp32.exe 3432 quickp32.exe 4852 quickp32.exe 1944 quickp32.exe 4628 quickp32.exe 3460 quickp32.exe 3948 quickp32.exe 2972 quickp32.exe 4260 quickp32.exe 4464 quickp32.exe 5076 quickp32.exe 4964 quickp32.exe 3864 quickp32.exe 3724 quickp32.exe 4856 quickp32.exe 4920 quickp32.exe 1628 quickp32.exe 2652 quickp32.exe 3516 quickp32.exe 1968 quickp32.exe 5036 quickp32.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 quickp32.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum quickp32.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\ quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File opened for modification C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe File created C:\Windows\SysWOW64\quickp32.exe quickp32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 49 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language quickp32.exe -
Modifies registry class 49 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ quickp32.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4712 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 4712 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 1820 quickp32.exe 1820 quickp32.exe 3900 quickp32.exe 3900 quickp32.exe 4968 quickp32.exe 4968 quickp32.exe 4976 quickp32.exe 4976 quickp32.exe 1280 quickp32.exe 1280 quickp32.exe 872 quickp32.exe 872 quickp32.exe 3336 quickp32.exe 3336 quickp32.exe 3804 quickp32.exe 3804 quickp32.exe 3228 quickp32.exe 3228 quickp32.exe 3096 quickp32.exe 3096 quickp32.exe 2900 quickp32.exe 2900 quickp32.exe 2904 quickp32.exe 2904 quickp32.exe 2348 quickp32.exe 2348 quickp32.exe 2928 quickp32.exe 2928 quickp32.exe 1012 quickp32.exe 1012 quickp32.exe 2044 quickp32.exe 2044 quickp32.exe 1448 quickp32.exe 1448 quickp32.exe 2324 quickp32.exe 2324 quickp32.exe 4532 quickp32.exe 4532 quickp32.exe 2932 quickp32.exe 2932 quickp32.exe 4956 quickp32.exe 4956 quickp32.exe 1588 quickp32.exe 1588 quickp32.exe 4356 quickp32.exe 4356 quickp32.exe 2136 quickp32.exe 2136 quickp32.exe 460 quickp32.exe 460 quickp32.exe 4292 quickp32.exe 4292 quickp32.exe 3420 quickp32.exe 3420 quickp32.exe 4564 quickp32.exe 4564 quickp32.exe 3772 quickp32.exe 3772 quickp32.exe 3432 quickp32.exe 3432 quickp32.exe 4852 quickp32.exe 4852 quickp32.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 4712 wrote to memory of 1820 4712 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 83 PID 4712 wrote to memory of 1820 4712 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 83 PID 4712 wrote to memory of 1820 4712 f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe 83 PID 1820 wrote to memory of 3900 1820 quickp32.exe 84 PID 1820 wrote to memory of 3900 1820 quickp32.exe 84 PID 1820 wrote to memory of 3900 1820 quickp32.exe 84 PID 3900 wrote to memory of 4968 3900 quickp32.exe 85 PID 3900 wrote to memory of 4968 3900 quickp32.exe 85 PID 3900 wrote to memory of 4968 3900 quickp32.exe 85 PID 4968 wrote to memory of 4976 4968 quickp32.exe 86 PID 4968 wrote to memory of 4976 4968 quickp32.exe 86 PID 4968 wrote to memory of 4976 4968 quickp32.exe 86 PID 4976 wrote to memory of 1280 4976 quickp32.exe 89 PID 4976 wrote to memory of 1280 4976 quickp32.exe 89 PID 4976 wrote to memory of 1280 4976 quickp32.exe 89 PID 1280 wrote to memory of 872 1280 quickp32.exe 92 PID 1280 wrote to memory of 872 1280 quickp32.exe 92 PID 1280 wrote to memory of 872 1280 quickp32.exe 92 PID 872 wrote to memory of 3336 872 quickp32.exe 94 PID 872 wrote to memory of 3336 872 quickp32.exe 94 PID 872 wrote to memory of 3336 872 quickp32.exe 94 PID 3336 wrote to memory of 3804 3336 quickp32.exe 97 PID 3336 wrote to memory of 3804 3336 quickp32.exe 97 PID 3336 wrote to memory of 3804 3336 quickp32.exe 97 PID 3804 wrote to memory of 3228 3804 quickp32.exe 98 PID 3804 wrote to memory of 3228 3804 quickp32.exe 98 PID 3804 wrote to memory of 3228 3804 quickp32.exe 98 PID 3228 wrote to memory of 3096 3228 quickp32.exe 99 PID 3228 wrote to memory of 3096 3228 quickp32.exe 99 PID 3228 wrote to memory of 3096 3228 quickp32.exe 99 PID 3096 wrote to memory of 2900 3096 quickp32.exe 101 PID 3096 wrote to memory of 2900 3096 quickp32.exe 101 PID 3096 wrote to memory of 2900 3096 quickp32.exe 101 PID 2900 wrote to memory of 2904 2900 quickp32.exe 103 PID 2900 wrote to memory of 2904 2900 quickp32.exe 103 PID 2900 wrote to memory of 2904 2900 quickp32.exe 103 PID 2904 wrote to memory of 2348 2904 quickp32.exe 104 PID 2904 wrote to memory of 2348 2904 quickp32.exe 104 PID 2904 wrote to memory of 2348 2904 quickp32.exe 104 PID 2348 wrote to memory of 2928 2348 quickp32.exe 105 PID 2348 wrote to memory of 2928 2348 quickp32.exe 105 PID 2348 wrote to memory of 2928 2348 quickp32.exe 105 PID 2928 wrote to memory of 1012 2928 quickp32.exe 106 PID 2928 wrote to memory of 1012 2928 quickp32.exe 106 PID 2928 wrote to memory of 1012 2928 quickp32.exe 106 PID 1012 wrote to memory of 2044 1012 quickp32.exe 107 PID 1012 wrote to memory of 2044 1012 quickp32.exe 107 PID 1012 wrote to memory of 2044 1012 quickp32.exe 107 PID 2044 wrote to memory of 1448 2044 quickp32.exe 108 PID 2044 wrote to memory of 1448 2044 quickp32.exe 108 PID 2044 wrote to memory of 1448 2044 quickp32.exe 108 PID 1448 wrote to memory of 2324 1448 quickp32.exe 109 PID 1448 wrote to memory of 2324 1448 quickp32.exe 109 PID 1448 wrote to memory of 2324 1448 quickp32.exe 109 PID 2324 wrote to memory of 4532 2324 quickp32.exe 110 PID 2324 wrote to memory of 4532 2324 quickp32.exe 110 PID 2324 wrote to memory of 4532 2324 quickp32.exe 110 PID 4532 wrote to memory of 2932 4532 quickp32.exe 111 PID 4532 wrote to memory of 2932 4532 quickp32.exe 111 PID 4532 wrote to memory of 2932 4532 quickp32.exe 111 PID 2932 wrote to memory of 4956 2932 quickp32.exe 112 PID 2932 wrote to memory of 4956 2932 quickp32.exe 112 PID 2932 wrote to memory of 4956 2932 quickp32.exe 112 PID 4956 wrote to memory of 1588 4956 quickp32.exe 113
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f7322adb60f972551f5a9f734bd5c7d6_JaffaCakes118.exe"1⤵
- Checks computer location settings
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Users\Admin\AppData\Local\Temp\F7322A~1.EXE2⤵
- Checks computer location settings
- Deletes itself
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe3⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3900 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe4⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe5⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4976 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe6⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1280 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe7⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:872 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe8⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3336 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe9⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3804 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe10⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3228 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe11⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3096 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe12⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe13⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe14⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe15⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe16⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1012 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe17⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe18⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe19⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe20⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4532 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe21⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe22⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4956 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe23⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:1588 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe24⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4356 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe25⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2136 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe26⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:460 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe27⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4292 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe28⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3420 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe29⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4564 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe30⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3772 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe31⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:3432 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe32⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:4852 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe33⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1944 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe34⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4628 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe35⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3460 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe36⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3948 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe37⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2972 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe38⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4260 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe39⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4464 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe40⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:5076 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe41⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4964 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe42⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3864 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe43⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3724 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe44⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4856 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe45⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:4920 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe46⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe47⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2652 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe48⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:3516 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe49⤵
- Checks computer location settings
- Executes dropped EXE
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:1968 -
C:\Windows\SysWOW64\quickp32.exe"C:\Windows\system32\quickp32.exe" C:\Windows\SysWOW64\quickp32.exe50⤵
- Executes dropped EXE
- Maps connected drives based on registry
PID:5036
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
252KB
MD5f7322adb60f972551f5a9f734bd5c7d6
SHA1c0c2b4265f8d15c8633b7997e9e7707e2a598a9d
SHA256e13764038fea1ad1225327008eb2a7aeeba2e480c522e4aa17b337a4ebb93b14
SHA512f2cef0046da12732cbd33a935554e34caef19d6052a7b9fced36419e98ddab3d7c00f54d053c73efe304744b84d8bc658ec3856af61fea7509cdc354f6144b92