Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
25-01-2025 10:03
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe
Resource
win7-20240729-en
General
-
Target
JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe
-
Size
179KB
-
MD5
2a8b5d1b104634099e0626369b4a0d73
-
SHA1
c94ec018ae1aa116dab97c2b7286c38f99f0f393
-
SHA256
d421eef701a66ab0b3971de6e995c73bce58dde4b1f9ed078062d8411bc0a36d
-
SHA512
1f5abedcbdbfdfd0d9d08e1d72d2fb4a73ba7310892e73861096f56ee607564624f0b18edc06c4b9993f39fae7c40599b322d26c857bf40aa2045f8f2ff18e67
-
SSDEEP
3072:4o1WTnBL5WBLoD/prG6QJ7Wo3fyKa58PkJypyGrc9RdXp:4wWTnB8+/prGFwo3fyC5pyGm
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exe,C:\\Users\\Admin\\AppData\\Local\\vktkgvyh\\eqlwqyfx.exe" svchost.exe -
Ramnit family
-
UAC bypass 3 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Drops startup file 2 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eqlwqyfx.exe svchost.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\eqlwqyfx.exe svchost.exe -
Executes dropped EXE 64 IoCs
pid Process 2540 vvjrvxhe.exe 1308 vvjrvxhe.exe 1720 vvjrvxhe.exe 744 vvjrvxhe.exe 1212 vvjrvxhe.exe 1956 vvjrvxhe.exe 1692 vvjrvxhe.exe 1628 vvjrvxhe.exe 2328 vvjrvxhe.exe 748 vvjrvxhe.exe 1092 vvjrvxhe.exe 316 vvjrvxhe.exe 2456 vvjrvxhe.exe 2460 vvjrvxhe.exe 1712 vvjrvxhe.exe 1708 vvjrvxhe.exe 832 vvjrvxhe.exe 604 vvjrvxhe.exe 2360 vvjrvxhe.exe 2088 vvjrvxhe.exe 1588 vvjrvxhe.exe 1992 vvjrvxhe.exe 2132 vvjrvxhe.exe 2136 vvjrvxhe.exe 3036 vvjrvxhe.exe 2636 vvjrvxhe.exe 2816 vvjrvxhe.exe 2520 vvjrvxhe.exe 668 vvjrvxhe.exe 800 vvjrvxhe.exe 1296 vvjrvxhe.exe 2000 vvjrvxhe.exe 2416 vvjrvxhe.exe 1940 vvjrvxhe.exe 1288 vvjrvxhe.exe 1148 vvjrvxhe.exe 2676 vvjrvxhe.exe 528 vvjrvxhe.exe 2680 vvjrvxhe.exe 328 vvjrvxhe.exe 896 vvjrvxhe.exe 1724 vvjrvxhe.exe 1532 vvjrvxhe.exe 1776 vvjrvxhe.exe 1712 vvjrvxhe.exe 684 vvjrvxhe.exe 2728 vvjrvxhe.exe 1480 vvjrvxhe.exe 2268 vvjrvxhe.exe 2956 vvjrvxhe.exe 1560 vvjrvxhe.exe 1700 vvjrvxhe.exe 2056 vvjrvxhe.exe 1488 vvjrvxhe.exe 2716 vvjrvxhe.exe 2628 vvjrvxhe.exe 2684 vvjrvxhe.exe 2500 vvjrvxhe.exe 2208 vvjrvxhe.exe 2564 vvjrvxhe.exe 764 vvjrvxhe.exe 2508 vvjrvxhe.exe 1680 vvjrvxhe.exe 1644 vvjrvxhe.exe -
Loads dropped DLL 64 IoCs
pid Process 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 2540 vvjrvxhe.exe 1308 vvjrvxhe.exe 1720 vvjrvxhe.exe 744 vvjrvxhe.exe 1212 vvjrvxhe.exe 1956 vvjrvxhe.exe 1692 vvjrvxhe.exe 1628 vvjrvxhe.exe 2328 vvjrvxhe.exe 748 vvjrvxhe.exe 1092 vvjrvxhe.exe 316 vvjrvxhe.exe 2456 vvjrvxhe.exe 2460 vvjrvxhe.exe 1712 vvjrvxhe.exe 1708 vvjrvxhe.exe 832 vvjrvxhe.exe 604 vvjrvxhe.exe 2360 vvjrvxhe.exe 2088 vvjrvxhe.exe 1588 vvjrvxhe.exe 1992 vvjrvxhe.exe 2132 vvjrvxhe.exe 2136 vvjrvxhe.exe 3036 vvjrvxhe.exe 2636 vvjrvxhe.exe 2816 vvjrvxhe.exe 2520 vvjrvxhe.exe 668 vvjrvxhe.exe 800 vvjrvxhe.exe 1296 vvjrvxhe.exe 2000 vvjrvxhe.exe 2416 vvjrvxhe.exe 1940 vvjrvxhe.exe 1288 vvjrvxhe.exe 1148 vvjrvxhe.exe 2676 vvjrvxhe.exe 528 vvjrvxhe.exe 2680 vvjrvxhe.exe 328 vvjrvxhe.exe 896 vvjrvxhe.exe 1724 vvjrvxhe.exe 1532 vvjrvxhe.exe 1776 vvjrvxhe.exe 1712 vvjrvxhe.exe 684 vvjrvxhe.exe 2728 vvjrvxhe.exe 1480 vvjrvxhe.exe 2268 vvjrvxhe.exe 2956 vvjrvxhe.exe 1560 vvjrvxhe.exe 1700 vvjrvxhe.exe 2056 vvjrvxhe.exe 1488 vvjrvxhe.exe 2716 vvjrvxhe.exe 2628 vvjrvxhe.exe 2684 vvjrvxhe.exe 2500 vvjrvxhe.exe 2208 vvjrvxhe.exe 2564 vvjrvxhe.exe 764 vvjrvxhe.exe 2508 vvjrvxhe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Windows\CurrentVersion\Run\EqlWqyfx = "C:\\Users\\Admin\\AppData\\Local\\vktkgvyh\\eqlwqyfx.exe" svchost.exe -
Suspicious use of SetThreadContext 64 IoCs
description pid Process procid_target PID 2092 set thread context of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2540 set thread context of 1308 2540 vvjrvxhe.exe 35 PID 1720 set thread context of 744 1720 vvjrvxhe.exe 37 PID 1212 set thread context of 1956 1212 vvjrvxhe.exe 39 PID 1692 set thread context of 1628 1692 vvjrvxhe.exe 41 PID 2328 set thread context of 748 2328 vvjrvxhe.exe 43 PID 1092 set thread context of 316 1092 vvjrvxhe.exe 45 PID 2456 set thread context of 2460 2456 vvjrvxhe.exe 47 PID 1712 set thread context of 1708 1712 vvjrvxhe.exe 49 PID 832 set thread context of 604 832 vvjrvxhe.exe 51 PID 2360 set thread context of 2088 2360 vvjrvxhe.exe 53 PID 1588 set thread context of 1992 1588 vvjrvxhe.exe 55 PID 2132 set thread context of 2136 2132 vvjrvxhe.exe 57 PID 3036 set thread context of 2636 3036 vvjrvxhe.exe 59 PID 2816 set thread context of 2520 2816 vvjrvxhe.exe 61 PID 668 set thread context of 800 668 vvjrvxhe.exe 63 PID 1296 set thread context of 2000 1296 vvjrvxhe.exe 65 PID 2416 set thread context of 1940 2416 vvjrvxhe.exe 67 PID 1288 set thread context of 1148 1288 vvjrvxhe.exe 69 PID 2676 set thread context of 528 2676 vvjrvxhe.exe 71 PID 2680 set thread context of 328 2680 vvjrvxhe.exe 73 PID 896 set thread context of 1724 896 vvjrvxhe.exe 75 PID 1532 set thread context of 1776 1532 vvjrvxhe.exe 77 PID 1712 set thread context of 684 1712 vvjrvxhe.exe 79 PID 2728 set thread context of 1480 2728 vvjrvxhe.exe 81 PID 2268 set thread context of 2956 2268 vvjrvxhe.exe 83 PID 1560 set thread context of 1700 1560 vvjrvxhe.exe 85 PID 2056 set thread context of 1488 2056 vvjrvxhe.exe 87 PID 2716 set thread context of 2628 2716 vvjrvxhe.exe 89 PID 2684 set thread context of 2500 2684 vvjrvxhe.exe 91 PID 2208 set thread context of 2564 2208 vvjrvxhe.exe 93 PID 764 set thread context of 2508 764 vvjrvxhe.exe 95 PID 1680 set thread context of 1644 1680 vvjrvxhe.exe 97 PID 1936 set thread context of 1328 1936 vvjrvxhe.exe 99 PID 1152 set thread context of 2844 1152 vvjrvxhe.exe 101 PID 1692 set thread context of 2120 1692 vvjrvxhe.exe 103 PID 2296 set thread context of 1084 2296 vvjrvxhe.exe 105 PID 1088 set thread context of 1616 1088 vvjrvxhe.exe 107 PID 2376 set thread context of 2184 2376 vvjrvxhe.exe 109 PID 836 set thread context of 1820 836 vvjrvxhe.exe 111 PID 2008 set thread context of 568 2008 vvjrvxhe.exe 113 PID 2264 set thread context of 872 2264 vvjrvxhe.exe 115 PID 2152 set thread context of 1996 2152 vvjrvxhe.exe 117 PID 1196 set thread context of 1800 1196 vvjrvxhe.exe 119 PID 2708 set thread context of 2804 2708 vvjrvxhe.exe 121 PID 2800 set thread context of 2772 2800 vvjrvxhe.exe 123 PID 2944 set thread context of 2560 2944 vvjrvxhe.exe 125 PID 2532 set thread context of 1904 2532 vvjrvxhe.exe 127 PID 536 set thread context of 1568 536 vvjrvxhe.exe 129 PID 2252 set thread context of 2820 2252 vvjrvxhe.exe 131 PID 2556 set thread context of 2692 2556 vvjrvxhe.exe 133 PID 2848 set thread context of 952 2848 vvjrvxhe.exe 135 PID 1140 set thread context of 1048 1140 vvjrvxhe.exe 137 PID 740 set thread context of 904 740 vvjrvxhe.exe 139 PID 1672 set thread context of 1648 1672 vvjrvxhe.exe 141 PID 1844 set thread context of 632 1844 vvjrvxhe.exe 143 PID 2144 set thread context of 964 2144 vvjrvxhe.exe 145 PID 3000 set thread context of 868 3000 vvjrvxhe.exe 147 PID 2068 set thread context of 1968 2068 vvjrvxhe.exe 149 PID 2592 set thread context of 3004 2592 vvjrvxhe.exe 151 PID 2784 set thread context of 1652 2784 vvjrvxhe.exe 153 PID 2812 set thread context of 2940 2812 vvjrvxhe.exe 155 PID 2868 set thread context of 2532 2868 vvjrvxhe.exe 157 PID 1364 set thread context of 536 1364 vvjrvxhe.exe 159 -
resource yara_rule behavioral1/memory/1376-6-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-8-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-11-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-3-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-2-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-9-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-44-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1376-83-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1308-103-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/744-117-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1956-137-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1628-154-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/748-168-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/316-188-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1708-222-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2088-254-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2136-287-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2520-322-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2636-305-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/800-338-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1940-362-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/528-389-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1724-414-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1776-427-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1480-452-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1700-477-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1488-488-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2500-513-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1644-550-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1616-611-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1800-686-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2560-723-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/904-806-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/964-845-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1652-894-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2380-953-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2764-1016-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-1025-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-1033-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-1492-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2008-1511-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/776-1532-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1576-1573-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/1692-1586-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2360-1881-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-2186-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-2641-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2740-2660-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-2832-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2188-2856-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2600-2875-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/2572-2960-0x0000000000400000-0x0000000000435000-memory.dmp upx behavioral1/memory/832-2993-0x0000000000400000-0x0000000000435000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbgnqlig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language iexplore.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language jbgnqlig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vvjrvxhe.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff19000000190000009f0400007e020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Zoom IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff5600000000000000dc04000065020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\GPU IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff3d0000003d000000c3040000a2020000 IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff6f00000019000000f50400007e020000 IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\PageSetup IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "443961304" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IETld\LowMic IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\InternetRegistry IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\IntelliForms IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Toolbar IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{B0B23AB1-DB03-11EF-9438-E643F72B7232} = "0" IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2703099537-420551529-3771253338-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff00000000000000008604000065020000 IEXPLORE.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe 2632 svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeSecurityPrivilege 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe Token: SeDebugPrivilege 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe Token: SeSecurityPrivilege 1732 svchost.exe Token: SeSecurityPrivilege 2632 svchost.exe Token: SeDebugPrivilege 2632 svchost.exe Token: SeSecurityPrivilege 1308 vvjrvxhe.exe Token: SeDebugPrivilege 1308 vvjrvxhe.exe Token: SeSecurityPrivilege 744 vvjrvxhe.exe Token: SeDebugPrivilege 744 vvjrvxhe.exe Token: SeSecurityPrivilege 1956 vvjrvxhe.exe Token: SeDebugPrivilege 1956 vvjrvxhe.exe Token: SeSecurityPrivilege 1628 vvjrvxhe.exe Token: SeDebugPrivilege 1628 vvjrvxhe.exe Token: SeSecurityPrivilege 748 vvjrvxhe.exe Token: SeDebugPrivilege 748 vvjrvxhe.exe Token: SeSecurityPrivilege 316 vvjrvxhe.exe Token: SeDebugPrivilege 316 vvjrvxhe.exe Token: SeSecurityPrivilege 2460 vvjrvxhe.exe Token: SeDebugPrivilege 2460 vvjrvxhe.exe Token: SeSecurityPrivilege 1708 vvjrvxhe.exe Token: SeDebugPrivilege 1708 vvjrvxhe.exe Token: SeSecurityPrivilege 604 vvjrvxhe.exe Token: SeDebugPrivilege 604 vvjrvxhe.exe Token: SeSecurityPrivilege 2088 vvjrvxhe.exe Token: SeDebugPrivilege 2088 vvjrvxhe.exe Token: SeSecurityPrivilege 1992 vvjrvxhe.exe Token: SeDebugPrivilege 1992 vvjrvxhe.exe Token: SeSecurityPrivilege 2136 vvjrvxhe.exe Token: SeDebugPrivilege 2136 vvjrvxhe.exe Token: SeSecurityPrivilege 2636 vvjrvxhe.exe Token: SeDebugPrivilege 2636 vvjrvxhe.exe Token: SeSecurityPrivilege 2520 vvjrvxhe.exe Token: SeDebugPrivilege 2520 vvjrvxhe.exe Token: SeSecurityPrivilege 800 vvjrvxhe.exe Token: SeDebugPrivilege 800 vvjrvxhe.exe Token: SeSecurityPrivilege 2000 vvjrvxhe.exe Token: SeDebugPrivilege 2000 vvjrvxhe.exe Token: SeSecurityPrivilege 1940 vvjrvxhe.exe Token: SeDebugPrivilege 1940 vvjrvxhe.exe Token: SeSecurityPrivilege 1148 vvjrvxhe.exe Token: SeDebugPrivilege 1148 vvjrvxhe.exe Token: SeSecurityPrivilege 528 vvjrvxhe.exe Token: SeDebugPrivilege 528 vvjrvxhe.exe Token: SeSecurityPrivilege 328 vvjrvxhe.exe Token: SeDebugPrivilege 328 vvjrvxhe.exe Token: SeSecurityPrivilege 1724 vvjrvxhe.exe Token: SeDebugPrivilege 1724 vvjrvxhe.exe Token: SeSecurityPrivilege 1776 vvjrvxhe.exe Token: SeDebugPrivilege 1776 vvjrvxhe.exe Token: SeSecurityPrivilege 684 vvjrvxhe.exe Token: SeDebugPrivilege 684 vvjrvxhe.exe Token: SeSecurityPrivilege 1480 vvjrvxhe.exe Token: SeDebugPrivilege 1480 vvjrvxhe.exe Token: SeSecurityPrivilege 2956 vvjrvxhe.exe Token: SeDebugPrivilege 2956 vvjrvxhe.exe Token: SeSecurityPrivilege 1700 vvjrvxhe.exe Token: SeDebugPrivilege 1700 vvjrvxhe.exe Token: SeSecurityPrivilege 1488 vvjrvxhe.exe Token: SeDebugPrivilege 1488 vvjrvxhe.exe Token: SeSecurityPrivilege 2628 vvjrvxhe.exe Token: SeDebugPrivilege 2628 vvjrvxhe.exe Token: SeSecurityPrivilege 2500 vvjrvxhe.exe Token: SeDebugPrivilege 2500 vvjrvxhe.exe Token: SeSecurityPrivilege 2564 vvjrvxhe.exe -
Suspicious use of FindShellTrayWindow 6 IoCs
pid Process 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE -
Suspicious use of SetWindowsHookEx 36 IoCs
pid Process 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 1572 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 1556 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2432 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 3036 IEXPLORE.EXE 2668 IEXPLORE.EXE 2668 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE 2288 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 2092 wrote to memory of 1376 2092 JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe 31 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 1732 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 32 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2632 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 33 PID 1376 wrote to memory of 2540 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 34 PID 1376 wrote to memory of 2540 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 34 PID 1376 wrote to memory of 2540 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 34 PID 1376 wrote to memory of 2540 1376 jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe 34 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 2540 wrote to memory of 1308 2540 vvjrvxhe.exe 35 PID 1308 wrote to memory of 1720 1308 vvjrvxhe.exe 36 PID 1308 wrote to memory of 1720 1308 vvjrvxhe.exe 36 PID 1308 wrote to memory of 1720 1308 vvjrvxhe.exe 36 PID 1308 wrote to memory of 1720 1308 vvjrvxhe.exe 36 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 1720 wrote to memory of 744 1720 vvjrvxhe.exe 37 PID 744 wrote to memory of 1212 744 vvjrvxhe.exe 38 PID 744 wrote to memory of 1212 744 vvjrvxhe.exe 38 PID 744 wrote to memory of 1212 744 vvjrvxhe.exe 38 PID 744 wrote to memory of 1212 744 vvjrvxhe.exe 38 PID 1212 wrote to memory of 1956 1212 vvjrvxhe.exe 39 PID 1212 wrote to memory of 1956 1212 vvjrvxhe.exe 39 PID 1212 wrote to memory of 1956 1212 vvjrvxhe.exe 39 PID 1212 wrote to memory of 1956 1212 vvjrvxhe.exe 39 PID 1212 wrote to memory of 1956 1212 vvjrvxhe.exe 39 PID 1212 wrote to memory of 1956 1212 vvjrvxhe.exe 39
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_2a8b5d1b104634099e0626369b4a0d73.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2092 -
\??\c:\users\admin\appdata\local\temp\jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe"c:\users\admin\appdata\local\temp\jaffacakes118_2a8b5d1b104634099e0626369b4a0d73.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\svchost.exe3⤵
- Modifies WinLogon for persistence
- UAC bypass
- Drops startup file
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2540 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:744 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1212 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1692 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate11⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2328 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:748 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate13⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1092 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:316 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate15⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2456 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"16⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate17⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1712 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate19⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:832 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"20⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:604 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate21⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2360 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"22⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate23⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1588 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"24⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate25⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2132 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"26⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate27⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:3036 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"28⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate29⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2816 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate31⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:668 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"32⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:800 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate33⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1296 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"34⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate35⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2416 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"36⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate37⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1288 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"38⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate39⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2676 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"40⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:528 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate41⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2680 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"42⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:328 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate43⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:896 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"44⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate45⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1532 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"46⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate47⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1712 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"48⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:684 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate49⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2728 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"50⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate51⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2268 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"52⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate53⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:1560 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"54⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate55⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2056 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"56⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate57⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2716 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"58⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate59⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2684 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"60⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate61⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:2208 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"62⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate63⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
PID:764 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"64⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1680 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"66⤵
- Executes dropped EXE
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1936 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"68⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate69⤵
- Suspicious use of SetThreadContext
PID:1152 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"70⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate71⤵
- Suspicious use of SetThreadContext
PID:1692 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"72⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate73⤵
- Suspicious use of SetThreadContext
PID:2296 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"74⤵PID:1084
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate75⤵
- Suspicious use of SetThreadContext
PID:1088 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"76⤵
- System Location Discovery: System Language Discovery
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate77⤵
- Suspicious use of SetThreadContext
PID:2376 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"78⤵PID:2184
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate79⤵
- Suspicious use of SetThreadContext
PID:836 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"80⤵PID:1820
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate81⤵
- Suspicious use of SetThreadContext
PID:2008 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"82⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate83⤵
- Suspicious use of SetThreadContext
PID:2264 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"84⤵PID:872
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate85⤵
- Suspicious use of SetThreadContext
PID:2152 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"86⤵PID:1996
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate87⤵
- Suspicious use of SetThreadContext
PID:1196 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"88⤵PID:1800
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate89⤵
- Suspicious use of SetThreadContext
PID:2708 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"90⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate91⤵
- Suspicious use of SetThreadContext
PID:2800 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"92⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate93⤵
- Suspicious use of SetThreadContext
PID:2944 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"94⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2532 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"96⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate97⤵
- Suspicious use of SetThreadContext
PID:536 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"98⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate99⤵
- Suspicious use of SetThreadContext
PID:2252 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"100⤵PID:2820
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate101⤵
- Suspicious use of SetThreadContext
PID:2556 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"102⤵PID:2692
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate103⤵
- Suspicious use of SetThreadContext
PID:2848 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"104⤵PID:952
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate105⤵
- Suspicious use of SetThreadContext
PID:1140 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"106⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate107⤵
- Suspicious use of SetThreadContext
PID:740 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"108⤵PID:904
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate109⤵
- Suspicious use of SetThreadContext
PID:1672 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"110⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate111⤵
- Suspicious use of SetThreadContext
PID:1844 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"112⤵PID:632
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate113⤵
- Suspicious use of SetThreadContext
PID:2144 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"114⤵PID:964
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate115⤵
- Suspicious use of SetThreadContext
PID:3000 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"116⤵PID:868
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate117⤵
- Suspicious use of SetThreadContext
PID:2068 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"118⤵
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate119⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2592 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"120⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe"C:\Users\Admin\AppData\Local\Temp\vvjrvxhe.exe" elevate121⤵
- Suspicious use of SetThreadContext
PID:2784 -
\??\c:\users\admin\appdata\local\temp\vvjrvxhe.exe"c:\users\admin\appdata\local\temp\vvjrvxhe.exe"122⤵PID:1652
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-