Analysis
-
max time kernel
94s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
18-12-2024 11:07
Behavioral task
behavioral1
Sample
fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe
Resource
win10v2004-20241007-en
General
-
Target
fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe
-
Size
178KB
-
MD5
fb4c7497a06e7cf518b8ca3cc7b3f226
-
SHA1
ef815a9449f7bd26fd557037c8c748314d3912ad
-
SHA256
c3db870e54e663cfa26aa9432ddedc0505bdb4dacf7b738a1cdaf573d0809332
-
SHA512
0497334246d34552d9ff258b8d1fe7a855ec72b67305551d99fb5da54161e0cc5c7b2179ce39c6f05d606f17ebd7a2047d852bd119a0534f690415c5cd4c9d28
-
SSDEEP
3072:sr85Ck7W1IkEoFR7u1EzH2n5rSsCqmWkRdsIMRk/ICxa5omST47r85C:k9ZuzPnt9
Malware Config
Signatures
-
Detect Neshta payload 64 IoCs
resource yara_rule behavioral2/files/0x0007000000023cb3-4.dat family_neshta behavioral2/files/0x0007000000023cb4-10.dat family_neshta behavioral2/memory/4776-18-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1160-22-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2388-30-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5028-34-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1704-42-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1552-46-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2788-54-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2768-64-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3088-66-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3296-70-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0006000000020237-85.dat family_neshta behavioral2/files/0x00010000000202cc-95.dat family_neshta behavioral2/files/0x000400000002035b-94.dat family_neshta behavioral2/files/0x00010000000202b9-93.dat family_neshta behavioral2/memory/4388-90-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3368-104-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1656-112-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1716-123-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/736-130-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3784-146-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x0001000000022f52-158.dat family_neshta behavioral2/files/0x0001000000022f56-157.dat family_neshta behavioral2/files/0x000100000001680a-169.dat family_neshta behavioral2/files/0x000100000001dbb9-182.dat family_neshta behavioral2/files/0x0001000000016923-190.dat family_neshta behavioral2/files/0x0001000000016921-194.dat family_neshta behavioral2/files/0x0001000000022e91-196.dat family_neshta behavioral2/files/0x000100000001691e-193.dat family_neshta behavioral2/files/0x0001000000022f95-166.dat family_neshta behavioral2/files/0x0002000000000729-201.dat family_neshta behavioral2/files/0x0001000000021501-145.dat family_neshta behavioral2/files/0x0001000000021500-143.dat family_neshta behavioral2/files/0x00010000000214ff-141.dat family_neshta behavioral2/files/0x000400000001e5ff-204.dat family_neshta behavioral2/memory/4692-225-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/files/0x000b00000001ee2c-230.dat family_neshta behavioral2/files/0x000e00000001f3ea-224.dat family_neshta behavioral2/files/0x000400000001e6c4-222.dat family_neshta behavioral2/memory/1140-206-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3708-233-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1404-243-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2644-244-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4564-251-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4408-256-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4568-258-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5016-264-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1532-271-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1752-272-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1648-279-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2520-280-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4288-282-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1836-288-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/940-294-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3032-296-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3056-298-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/1988-304-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3300-306-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/4024-312-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/5032-314-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/2040-320-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3416-322-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta behavioral2/memory/3368-328-0x0000000000400000-0x000000000041B000-memory.dmp family_neshta -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Neshta family
-
Checks computer location settings 2 TTPs 64 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE Key value queried \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\International\Geo\Nation FB4C74~1.EXE -
Executes dropped EXE 64 IoCs
pid Process 3052 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 4776 svchost.com 1160 FB4C74~1.EXE 2388 svchost.com 5028 FB4C74~1.EXE 1704 svchost.com 1552 FB4C74~1.EXE 2788 svchost.com 2768 FB4C74~1.EXE 3088 svchost.com 3296 FB4C74~1.EXE 4388 svchost.com 3368 FB4C74~1.EXE 1656 svchost.com 1716 FB4C74~1.EXE 736 svchost.com 3784 FB4C74~1.EXE 1140 svchost.com 4692 FB4C74~1.EXE 3708 svchost.com 1404 FB4C74~1.EXE 2644 svchost.com 4564 FB4C74~1.EXE 4408 svchost.com 4568 FB4C74~1.EXE 5016 svchost.com 1532 FB4C74~1.EXE 1752 svchost.com 1648 FB4C74~1.EXE 2520 svchost.com 4288 FB4C74~1.EXE 1836 svchost.com 940 FB4C74~1.EXE 3032 svchost.com 3056 FB4C74~1.EXE 1988 svchost.com 3300 FB4C74~1.EXE 4024 svchost.com 5032 FB4C74~1.EXE 2040 svchost.com 3416 FB4C74~1.EXE 3368 svchost.com 4632 FB4C74~1.EXE 3972 svchost.com 2884 FB4C74~1.EXE 3928 svchost.com 2064 FB4C74~1.EXE 2708 svchost.com 4580 FB4C74~1.EXE 3604 svchost.com 3716 FB4C74~1.EXE 3540 svchost.com 1140 FB4C74~1.EXE 1760 svchost.com 1368 FB4C74~1.EXE 1340 svchost.com 2608 FB4C74~1.EXE 4840 svchost.com 2532 FB4C74~1.EXE 3424 svchost.com 2360 FB4C74~1.EXE 1044 svchost.com 4004 FB4C74~1.EXE 4644 svchost.com -
Modifies system executable filetype association 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" FB4C74~1.EXE -
Reads user/profile data of web browsers 3 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Drops file in Program Files directory 64 IoCs
description ioc Process File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\Eula.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Java\JAVAUP~1\jaureg.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{D87AE~1\WINDOW~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpshare.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmpconfig.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADOBEC~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\WOW_HE~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\Oracle\Java\javapath\javaw.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~2.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\IDENTI~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~2\wabmig.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~2.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\MSEDGE~2.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\MSEDGE~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~3\ACCESS~1\wordpad.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROBR~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\ELEVAT~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WI8A19~1\ImagingDevices.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\32BITM~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GO664E~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\920902~1.67\INSTAL~1\setup.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\msedge.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{CA675~1\VCREDI~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\setup_wm.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\WINDOW~4\wmprph.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ADelRCP.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\ACROTE~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\Edge\APPLIC~1\PWAHEL~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\WINDOW~4\wmlaunch.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOF5E2~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MIA062~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\AcroRd32.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\READER~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~3.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.371\GOOGLE~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MICROS~3.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\FULLTR~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\LOGTRA~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\MICROS~1\EDGEUP~1\13147~1.37\MID1AD~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe FB4C74~1.EXE File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\arh.exe fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe File opened for modification C:\PROGRA~2\Adobe\ACROBA~1\Reader\plug_ins\PI_BRO~1\64BITM~1.EXE fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys FB4C74~1.EXE File opened for modification C:\Windows\directx.sys svchost.com File opened for modification C:\Windows\svchost.com svchost.com File opened for modification C:\Windows\directx.sys svchost.com -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FB4C74~1.EXE -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString dw20.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS dw20.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU dw20.exe -
Modifies registry class 64 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE Key created \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000_Classes\Local Settings FB4C74~1.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeBackupPrivilege 3128 dw20.exe Token: SeBackupPrivilege 3128 dw20.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3180 wrote to memory of 3052 3180 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 82 PID 3180 wrote to memory of 3052 3180 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 82 PID 3180 wrote to memory of 3052 3180 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 82 PID 3052 wrote to memory of 4776 3052 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 83 PID 3052 wrote to memory of 4776 3052 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 83 PID 3052 wrote to memory of 4776 3052 fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe 83 PID 4776 wrote to memory of 1160 4776 svchost.com 84 PID 4776 wrote to memory of 1160 4776 svchost.com 84 PID 4776 wrote to memory of 1160 4776 svchost.com 84 PID 1160 wrote to memory of 2388 1160 FB4C74~1.EXE 85 PID 1160 wrote to memory of 2388 1160 FB4C74~1.EXE 85 PID 1160 wrote to memory of 2388 1160 FB4C74~1.EXE 85 PID 2388 wrote to memory of 5028 2388 svchost.com 86 PID 2388 wrote to memory of 5028 2388 svchost.com 86 PID 2388 wrote to memory of 5028 2388 svchost.com 86 PID 5028 wrote to memory of 1704 5028 FB4C74~1.EXE 87 PID 5028 wrote to memory of 1704 5028 FB4C74~1.EXE 87 PID 5028 wrote to memory of 1704 5028 FB4C74~1.EXE 87 PID 1704 wrote to memory of 1552 1704 svchost.com 88 PID 1704 wrote to memory of 1552 1704 svchost.com 88 PID 1704 wrote to memory of 1552 1704 svchost.com 88 PID 1552 wrote to memory of 2788 1552 FB4C74~1.EXE 89 PID 1552 wrote to memory of 2788 1552 FB4C74~1.EXE 89 PID 1552 wrote to memory of 2788 1552 FB4C74~1.EXE 89 PID 2788 wrote to memory of 2768 2788 svchost.com 90 PID 2788 wrote to memory of 2768 2788 svchost.com 90 PID 2788 wrote to memory of 2768 2788 svchost.com 90 PID 2768 wrote to memory of 3088 2768 FB4C74~1.EXE 91 PID 2768 wrote to memory of 3088 2768 FB4C74~1.EXE 91 PID 2768 wrote to memory of 3088 2768 FB4C74~1.EXE 91 PID 3088 wrote to memory of 3296 3088 svchost.com 92 PID 3088 wrote to memory of 3296 3088 svchost.com 92 PID 3088 wrote to memory of 3296 3088 svchost.com 92 PID 3296 wrote to memory of 4388 3296 FB4C74~1.EXE 93 PID 3296 wrote to memory of 4388 3296 FB4C74~1.EXE 93 PID 3296 wrote to memory of 4388 3296 FB4C74~1.EXE 93 PID 4388 wrote to memory of 3368 4388 svchost.com 123 PID 4388 wrote to memory of 3368 4388 svchost.com 123 PID 4388 wrote to memory of 3368 4388 svchost.com 123 PID 3368 wrote to memory of 1656 3368 FB4C74~1.EXE 95 PID 3368 wrote to memory of 1656 3368 FB4C74~1.EXE 95 PID 3368 wrote to memory of 1656 3368 FB4C74~1.EXE 95 PID 1656 wrote to memory of 1716 1656 svchost.com 167 PID 1656 wrote to memory of 1716 1656 svchost.com 167 PID 1656 wrote to memory of 1716 1656 svchost.com 167 PID 1716 wrote to memory of 736 1716 FB4C74~1.EXE 97 PID 1716 wrote to memory of 736 1716 FB4C74~1.EXE 97 PID 1716 wrote to memory of 736 1716 FB4C74~1.EXE 97 PID 736 wrote to memory of 3784 736 svchost.com 98 PID 736 wrote to memory of 3784 736 svchost.com 98 PID 736 wrote to memory of 3784 736 svchost.com 98 PID 3784 wrote to memory of 1140 3784 FB4C74~1.EXE 134 PID 3784 wrote to memory of 1140 3784 FB4C74~1.EXE 134 PID 3784 wrote to memory of 1140 3784 FB4C74~1.EXE 134 PID 1140 wrote to memory of 4692 1140 svchost.com 100 PID 1140 wrote to memory of 4692 1140 svchost.com 100 PID 1140 wrote to memory of 4692 1140 svchost.com 100 PID 4692 wrote to memory of 3708 4692 FB4C74~1.EXE 101 PID 4692 wrote to memory of 3708 4692 FB4C74~1.EXE 101 PID 4692 wrote to memory of 3708 4692 FB4C74~1.EXE 101 PID 3708 wrote to memory of 1404 3708 svchost.com 102 PID 3708 wrote to memory of 1404 3708 svchost.com 102 PID 3708 wrote to memory of 1404 3708 svchost.com 102 PID 1404 wrote to memory of 2644 1404 FB4C74~1.EXE 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe"1⤵
- Modifies system executable filetype association
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3180 -
C:\Users\Admin\AppData\Local\Temp\3582-490\fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\fb4c7497a06e7cf518b8ca3cc7b3f226_JaffaCakes118.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE6⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1552 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"11⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3088 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE12⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:3296 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE16⤵
- Executes dropped EXE
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:736 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3784 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE20⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4692 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE24⤵
- Executes dropped EXE
PID:4564 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"25⤵
- Executes dropped EXE
PID:4408 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE26⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:4568 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"27⤵
- Executes dropped EXE
PID:5016 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE28⤵
- Executes dropped EXE
- Modifies registry class
PID:1532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"29⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE30⤵
- Executes dropped EXE
PID:1648 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"31⤵
- Executes dropped EXE
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE32⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
PID:4288 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"33⤵
- Executes dropped EXE
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE34⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Modifies registry class
PID:940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"35⤵
- Executes dropped EXE
- Drops file in Windows directory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE36⤵
- Executes dropped EXE
PID:3056 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"37⤵
- Executes dropped EXE
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE38⤵
- Executes dropped EXE
PID:3300 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"39⤵
- Executes dropped EXE
PID:4024 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE40⤵
- Executes dropped EXE
PID:5032 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"41⤵
- Executes dropped EXE
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE42⤵
- Executes dropped EXE
- Modifies registry class
PID:3416 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"43⤵
- Executes dropped EXE
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE44⤵
- Executes dropped EXE
PID:4632 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"45⤵
- Executes dropped EXE
PID:3972 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE46⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2884 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"47⤵
- Executes dropped EXE
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE48⤵
- Checks computer location settings
- Executes dropped EXE
PID:2064 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"49⤵
- Executes dropped EXE
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE50⤵
- Checks computer location settings
- Executes dropped EXE
PID:4580 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"51⤵
- Executes dropped EXE
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE52⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3716 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"53⤵
- Executes dropped EXE
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE54⤵
- Checks computer location settings
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1140 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"55⤵
- Executes dropped EXE
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE56⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1368 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"57⤵
- Executes dropped EXE
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE58⤵
- Executes dropped EXE
PID:2608 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"59⤵
- Executes dropped EXE
PID:4840 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE60⤵
- Executes dropped EXE
- Modifies registry class
PID:2532 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"61⤵
- Executes dropped EXE
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE62⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2360 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"63⤵
- Executes dropped EXE
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE64⤵
- Executes dropped EXE
PID:4004 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"65⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4644 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE66⤵PID:4444
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"67⤵PID:436
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE68⤵PID:1648
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"69⤵PID:4592
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE70⤵
- Checks computer location settings
- Modifies registry class
PID:4044 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"71⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE72⤵PID:4648
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"73⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE74⤵
- Checks computer location settings
PID:940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"75⤵
- System Location Discovery: System Language Discovery
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE76⤵
- Modifies registry class
PID:3736 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"77⤵PID:4608
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE78⤵PID:4732
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"79⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE80⤵PID:3436
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"81⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE82⤵
- Checks computer location settings
PID:3752 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"83⤵PID:2876
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE84⤵
- Checks computer location settings
- Modifies system executable filetype association
- Drops file in Program Files directory
PID:1208 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"85⤵
- System Location Discovery: System Language Discovery
PID:3368 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE86⤵
- Modifies registry class
PID:3924 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"87⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE88⤵
- Modifies registry class
PID:3972 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"89⤵
- System Location Discovery: System Language Discovery
PID:976 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE90⤵
- Checks computer location settings
PID:1908 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"91⤵PID:4348
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE92⤵PID:2900
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"93⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:4928 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE94⤵PID:2708
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"95⤵
- System Location Discovery: System Language Discovery
PID:3732 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE96⤵
- Modifies registry class
PID:2072 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"97⤵
- System Location Discovery: System Language Discovery
PID:208 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE98⤵PID:4120
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"99⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE100⤵
- Checks computer location settings
PID:2028 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"101⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE102⤵PID:632
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"103⤵PID:4736
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE104⤵
- Modifies registry class
PID:956 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"105⤵PID:4188
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE106⤵
- Checks computer location settings
PID:2176 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"107⤵
- System Location Discovery: System Language Discovery
PID:3680 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE108⤵
- Modifies registry class
PID:4792 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"109⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE110⤵
- Drops file in Windows directory
- Modifies registry class
PID:2348 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"111⤵PID:1044
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE112⤵
- Modifies registry class
PID:5040 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"113⤵PID:4644
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE114⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
PID:4940 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"115⤵
- System Location Discovery: System Language Discovery
PID:4512 -
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE116⤵PID:468
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"117⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE118⤵
- Checks computer location settings
PID:1160 -
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"119⤵PID:972
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE120⤵PID:4012
-
C:\Windows\svchost.com"C:\Windows\svchost.com" "C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE"121⤵PID:216
-
C:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXEC:\Users\Admin\AppData\Local\Temp\3582-490\FB4C74~1.EXE122⤵PID:4764
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-