Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29-01-2025 14:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe
Resource
win7-20240903-en
General
-
Target
JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe
-
Size
76KB
-
MD5
582e95385dceba7e66294a156e2f31b3
-
SHA1
2fa90acc33d3866c6b9e9e0b4b9343f9cee157ea
-
SHA256
13fd36a4a8b14f3781d7a4ae6f817c113f3a412717dd66a71c3f9b221dbcdd4a
-
SHA512
c494bcb3d78cd7d6ae06dd610c448a5ab027d7dc166d1341574c409c5a23537c0228e72b2b373a8eaad084d18973fcab0fd6a38e9532a8579c3f5104685ecd2f
-
SSDEEP
1536:z1lX3dYjOqZLCLe7TlyyFjz6n3AxYN7TgTrFOW:zj0OqlCLeHo8T5b
Malware Config
Extracted
xtremerat
s-i.no-ip.org
Signatures
-
Detect XtremeRAT payload 37 IoCs
resource yara_rule behavioral1/memory/2480-8-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2480-21-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2684-32-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3068-30-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2684-39-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/972-45-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2084-51-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/852-58-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2208-66-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/880-74-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/1096-73-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/880-78-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/896-85-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3040-89-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2992-96-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2104-100-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2604-107-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/1496-112-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/1764-118-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2644-122-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/700-129-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/1968-135-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/852-142-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2604-141-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/852-146-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2492-154-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/1144-153-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2492-159-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/2928-166-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/316-170-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3096-173-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3244-177-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3352-181-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3472-185-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3588-189-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3704-193-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat behavioral1/memory/3820-196-0x0000000000C80000-0x0000000000C96000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 64 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" 229.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003} %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{SFAXPOF0-11MG-1BJ8-6LS6-SVW4421Q4003}\StubPath = "C:\\Windows\\InstallDir\\%TEMP%.scr restart" %TEMP%.scr -
Executes dropped EXE 33 IoCs
pid Process 2480 229.exe 3068 %TEMP%.scr 2684 %TEMP%.scr 972 %TEMP%.scr 2084 %TEMP%.scr 852 %TEMP%.scr 2208 %TEMP%.scr 1096 %TEMP%.scr 880 %TEMP%.scr 896 %TEMP%.scr 3040 %TEMP%.scr 2992 %TEMP%.scr 2104 %TEMP%.scr 2604 %TEMP%.scr 1496 %TEMP%.scr 1764 %TEMP%.scr 2644 %TEMP%.scr 700 %TEMP%.scr 1968 %TEMP%.scr 2604 %TEMP%.scr 852 %TEMP%.scr 1144 %TEMP%.scr 2492 %TEMP%.scr 2928 %TEMP%.scr 316 %TEMP%.scr 3096 %TEMP%.scr 3244 %TEMP%.scr 3352 %TEMP%.scr 3472 %TEMP%.scr 3588 %TEMP%.scr 3704 %TEMP%.scr 3820 %TEMP%.scr 3940 %TEMP%.scr -
Loads dropped DLL 33 IoCs
pid Process 2480 229.exe 2480 229.exe 3068 %TEMP%.scr 2684 %TEMP%.scr 972 %TEMP%.scr 2084 %TEMP%.scr 852 %TEMP%.scr 2208 %TEMP%.scr 1096 %TEMP%.scr 880 %TEMP%.scr 896 %TEMP%.scr 3040 %TEMP%.scr 2992 %TEMP%.scr 2104 %TEMP%.scr 2604 %TEMP%.scr 1496 %TEMP%.scr 1764 %TEMP%.scr 2644 %TEMP%.scr 700 %TEMP%.scr 1968 %TEMP%.scr 2604 %TEMP%.scr 852 %TEMP%.scr 1144 %TEMP%.scr 2492 %TEMP%.scr 2928 %TEMP%.scr 316 %TEMP%.scr 3096 %TEMP%.scr 3244 %TEMP%.scr 3352 %TEMP%.scr 3472 %TEMP%.scr 3588 %TEMP%.scr 3704 %TEMP%.scr 3820 %TEMP%.scr -
Adds Run key to start application 2 TTPs 64 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" 229.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" 229.exe Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\HKLM = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr Set value (str) \REGISTRY\USER\S-1-5-21-312935884-697965778-3955649944-1000\Software\Microsoft\Windows\CurrentVersion\Run\HKCU = "C:\\Windows\\InstallDir\\%TEMP%.scr" %TEMP%.scr -
resource yara_rule behavioral1/files/0x000f000000012245-6.dat upx behavioral1/memory/2480-8-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2480-21-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3068-23-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2684-32-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3068-30-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2684-36-0x0000000002A80000-0x0000000002A96000-memory.dmp upx behavioral1/memory/972-40-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2684-39-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/972-45-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2084-51-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/852-53-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/852-58-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2208-59-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2208-66-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/880-74-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1096-73-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/880-78-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/896-85-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3040-89-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2992-96-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2104-100-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2604-107-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1496-112-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1764-118-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2644-122-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1968-130-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/700-129-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1968-135-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/852-142-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2604-141-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/852-146-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2492-154-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/1144-153-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2492-159-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/2928-166-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/316-170-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3096-173-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3244-177-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3352-181-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3472-185-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3588-189-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3704-193-0x0000000000C80000-0x0000000000C96000-memory.dmp upx behavioral1/memory/3820-196-0x0000000000C80000-0x0000000000C96000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\InstallDir\%TEMP%.scr 229.exe File created C:\Windows\InstallDir\%TEMP%.scr 229.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 33 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 229.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language %TEMP%.scr -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2480 2996 JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe 31 PID 2996 wrote to memory of 2480 2996 JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe 31 PID 2996 wrote to memory of 2480 2996 JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe 31 PID 2996 wrote to memory of 2480 2996 JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe 31 PID 2480 wrote to memory of 2064 2480 229.exe 32 PID 2480 wrote to memory of 2064 2480 229.exe 32 PID 2480 wrote to memory of 2064 2480 229.exe 32 PID 2480 wrote to memory of 2064 2480 229.exe 32 PID 2480 wrote to memory of 2064 2480 229.exe 32 PID 2480 wrote to memory of 2872 2480 229.exe 33 PID 2480 wrote to memory of 2872 2480 229.exe 33 PID 2480 wrote to memory of 2872 2480 229.exe 33 PID 2480 wrote to memory of 2872 2480 229.exe 33 PID 2480 wrote to memory of 2872 2480 229.exe 33 PID 2480 wrote to memory of 2132 2480 229.exe 34 PID 2480 wrote to memory of 2132 2480 229.exe 34 PID 2480 wrote to memory of 2132 2480 229.exe 34 PID 2480 wrote to memory of 2132 2480 229.exe 34 PID 2480 wrote to memory of 2132 2480 229.exe 34 PID 2480 wrote to memory of 2632 2480 229.exe 35 PID 2480 wrote to memory of 2632 2480 229.exe 35 PID 2480 wrote to memory of 2632 2480 229.exe 35 PID 2480 wrote to memory of 2632 2480 229.exe 35 PID 2480 wrote to memory of 2632 2480 229.exe 35 PID 2480 wrote to memory of 1044 2480 229.exe 36 PID 2480 wrote to memory of 1044 2480 229.exe 36 PID 2480 wrote to memory of 1044 2480 229.exe 36 PID 2480 wrote to memory of 1044 2480 229.exe 36 PID 2480 wrote to memory of 1044 2480 229.exe 36 PID 2480 wrote to memory of 1740 2480 229.exe 37 PID 2480 wrote to memory of 1740 2480 229.exe 37 PID 2480 wrote to memory of 1740 2480 229.exe 37 PID 2480 wrote to memory of 1740 2480 229.exe 37 PID 2480 wrote to memory of 1740 2480 229.exe 37 PID 2480 wrote to memory of 2784 2480 229.exe 38 PID 2480 wrote to memory of 2784 2480 229.exe 38 PID 2480 wrote to memory of 2784 2480 229.exe 38 PID 2480 wrote to memory of 2784 2480 229.exe 38 PID 2480 wrote to memory of 2784 2480 229.exe 38 PID 2480 wrote to memory of 2964 2480 229.exe 39 PID 2480 wrote to memory of 2964 2480 229.exe 39 PID 2480 wrote to memory of 2964 2480 229.exe 39 PID 2480 wrote to memory of 2964 2480 229.exe 39 PID 2480 wrote to memory of 3068 2480 229.exe 40 PID 2480 wrote to memory of 3068 2480 229.exe 40 PID 2480 wrote to memory of 3068 2480 229.exe 40 PID 2480 wrote to memory of 3068 2480 229.exe 40 PID 3068 wrote to memory of 2704 3068 %TEMP%.scr 41 PID 3068 wrote to memory of 2704 3068 %TEMP%.scr 41 PID 3068 wrote to memory of 2704 3068 %TEMP%.scr 41 PID 3068 wrote to memory of 2704 3068 %TEMP%.scr 41 PID 3068 wrote to memory of 2704 3068 %TEMP%.scr 41 PID 3068 wrote to memory of 2672 3068 %TEMP%.scr 42 PID 3068 wrote to memory of 2672 3068 %TEMP%.scr 42 PID 3068 wrote to memory of 2672 3068 %TEMP%.scr 42 PID 3068 wrote to memory of 2672 3068 %TEMP%.scr 42 PID 3068 wrote to memory of 2672 3068 %TEMP%.scr 42 PID 3068 wrote to memory of 2556 3068 %TEMP%.scr 43 PID 3068 wrote to memory of 2556 3068 %TEMP%.scr 43 PID 3068 wrote to memory of 2556 3068 %TEMP%.scr 43 PID 3068 wrote to memory of 2556 3068 %TEMP%.scr 43 PID 3068 wrote to memory of 2556 3068 %TEMP%.scr 43 PID 3068 wrote to memory of 2708 3068 %TEMP%.scr 45 PID 3068 wrote to memory of 2708 3068 %TEMP%.scr 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_582e95385dceba7e66294a156e2f31b3.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\229.exeC:\Users\Admin\AppData\Local\Temp\229.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2632
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1044
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:1740
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"3⤵PID:2964
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S3⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2704
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2584
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2724
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"4⤵PID:2868
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S4⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2684 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2548
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2600
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2952
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:3000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"5⤵PID:2968
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:972 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1516
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1688
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1284
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1624
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:340
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:1988
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2068
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"6⤵PID:2396
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S6⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2084 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1196
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1728
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1784
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1812
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1708
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:1032
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"7⤵PID:2008
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S7⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:852 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:1780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2536
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2832
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2616
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2248
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"8⤵PID:2224
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S8⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2208 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2200
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1912
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2436
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:2852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:1476
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"9⤵PID:408
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S9⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1096 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:236
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1116
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1512
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1364
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1620
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1716
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:1484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"10⤵PID:2464
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S10⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:880 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1296
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1732
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:960
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1660
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1112
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"11⤵PID:1616
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S11⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:896 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:3004
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:1848
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:2000
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:3020
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"12⤵PID:2420
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S12⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3040 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:900
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2148
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2144
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:3052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:1592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:1576
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"13⤵PID:2488
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S13⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2992 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2520
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:592
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2312
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2688
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:3024
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2776
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"14⤵PID:2792
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S14⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2104 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2196
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2128
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:580
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2764
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:1060
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2588
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"15⤵PID:2524
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S15⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:2972
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:2076
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1200
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:1964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:2744
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:3064
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"16⤵PID:2184
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S16⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1496 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1668
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:2084
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1524
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:1164
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"17⤵PID:380
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S17⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1764 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2432
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:608
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:1540
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2408
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:844
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:2336
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"18⤵PID:976
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S18⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2644 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2532
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:276
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:1772
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:1552
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2192
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:484
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"19⤵PID:2288
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S19⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:700 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1504
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2404
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2324
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:2360
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"20⤵PID:1804
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S20⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1968 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2816
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2104
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2560
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2712
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:1696
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"21⤵PID:2740
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S21⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2604 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:1052
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2416
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:1748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2100
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:1572
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"22⤵PID:2636
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S22⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:852 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:2212
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:936
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:3012
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:2384
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:2236
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:1944
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"23⤵PID:2984
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S23⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:1144 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:908
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:3040
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2992
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:1864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:700
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2676
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2308
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"24⤵PID:2368
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S24⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2492 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:2356
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:2976
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:2392
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:1496
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:2424
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:2208
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"25⤵PID:3048
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S25⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2928 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:1488
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:1328
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:1636
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:2088
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:2364
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:2920
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:2400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"26⤵PID:2044
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S26⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:316 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:2996
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:2316
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:2440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:2156
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:1756
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:2604
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:896
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"27⤵PID:3084
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S27⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3096 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3132
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3140
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3180
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3188
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3200
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3208
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3220
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"28⤵PID:3228
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S28⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3244 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3268
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3280
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3292
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3300
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3312
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3320
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3332
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"29⤵PID:3340
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S29⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3352 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3388
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3400
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3408
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3420
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3428
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3440
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3448
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"30⤵PID:3460
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S30⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3472 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3500
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3516
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3524
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3536
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3544
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3556
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3564
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"31⤵PID:3576
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S31⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3588 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3620
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3628
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3640
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3652
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3664
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3672
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3684
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"32⤵PID:3692
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S32⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3704 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3736
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3748
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3760
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3768
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3780
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3788
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3800
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"33⤵PID:3808
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S33⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3820 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3852
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3864
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3872
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3884
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3892
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3904
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3916
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"34⤵PID:3928
-
-
C:\Windows\InstallDir\%TEMP%.scr"C:\Windows\InstallDir\%TEMP%.scr" /S34⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:3940 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵PID:3964
-
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe"35⤵PID:3980
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD55c03c2e8d908330ccba4b576230150c9
SHA180e34a05ccd8164e2b4e8a98115e608b35f98e9e
SHA256fbee17f678a915a017fe455abed1e6a0e1ef59e88f9de94c9f11e03c2e983e28
SHA512b3b9132196d0a8b5edec81ce06fc313a2e61a82d0b6320b6ffd511d39abb40a061286098c81e8d92ec4dd4dcb72667242ad3873d41947e9bfde8038f6c9f8deb
-
Filesize
1KB
MD59aee3c9432efe03fe2176d3940597de9
SHA1f3ecb1eeb91eff766816a3d6bddff90e76370172
SHA2569889053166cfa91e80a64df012154867184823a53a5d9ce541fb3c627a02a6ba
SHA512c4c26f0384d5dfdc0864e5061df124ef7d2cca2bf3ba1baa0c67d681e160b448925ee5a3941b9809e9199ef6a1025b12e3968637c9cc62c3eaf74cfdd677c289