Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20250207-en -
resource tags
arch:x64arch:x86image:win7-20250207-enlocale:en-usos:windows7-x64system -
submitted
20-02-2025 05:27
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe
Resource
win7-20250207-en
General
-
Target
JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe
-
Size
668KB
-
MD5
09e80c7246e970032b1c8fb0fcd9ded4
-
SHA1
534012a13b5e523128a2acee591aff057cf2d798
-
SHA256
7981d1d59a3d2328fa24c378de5ded0f1605764e58910fe9c82a91d544c381aa
-
SHA512
a7ba8fec81432e77c4e381dba1482e9c45519a8d39f3fc445896a9b75d2cb073b57bcda2e6aaa804138a20564791d48920b65a586b59356ab4934900a623bb63
-
SSDEEP
12288:AOqBS5JJ/+EkGz1lr3nxGteN4r3t8UOGz624SitfLmygYkvOW:hCSYE7z193Rit8UJ62BmhgVvOW
Malware Config
Extracted
xtremerat
sweetma198.no-ip.info
Signatures
-
Detect XtremeRAT payload 12 IoCs
resource yara_rule behavioral1/memory/2828-8-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2828-19-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2828-15-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2828-13-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2828-11-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2828-3-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2828-5-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2444-28-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2672-32-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2672-34-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2672-40-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat behavioral1/memory/2672-46-0x0000000000C80000-0x0000000000CE9000-memory.dmp family_xtremerat -
XtremeRAT
The XtremeRAT was developed by xtremecoder and has been available since at least 2010, and written in Delphi.
-
Xtremerat family
-
Boot or Logon Autostart Execution: Active Setup 2 TTPs 30 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchost.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT} svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{4DDUGML7-QPQ1-BGG4-6XGH-278WSMJ2O3QT}\StubPath = "C:\\Windows\\Microsoft\\svchos.exe restart" svchost.exe -
Executes dropped EXE 28 IoCs
pid Process 2008 svchos.exe 2172 svchos.exe 2092 svchos.exe 600 svchos.exe 348 svchos.exe 644 svchos.exe 2196 svchos.exe 1624 svchos.exe 2264 svchos.exe 2124 svchos.exe 548 svchos.exe 612 svchos.exe 2036 svchos.exe 2748 svchos.exe 2452 svchos.exe 2608 svchos.exe 3032 svchos.exe 1924 svchos.exe 1628 svchos.exe 2160 svchos.exe 1288 svchos.exe 1168 svchos.exe 2488 svchos.exe 2676 svchos.exe 1504 svchos.exe 1964 svchos.exe 2896 svchos.exe 2652 svchos.exe -
Loads dropped DLL 16 IoCs
pid Process 2672 svchost.exe 2672 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe 2444 svchost.exe -
Adds Run key to start application 2 TTPs 30 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchos.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000\Software\Microsoft\Windows\CurrentVersion\Run\skypa = "C:\\Windows\\Microsoft\\svchos.exe" svchost.exe -
Suspicious use of SetThreadContext 22 IoCs
description pid Process procid_target PID 2824 set thread context of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2008 set thread context of 2092 2008 svchos.exe 35 PID 2092 set thread context of 3036 2092 svchos.exe 36 PID 2172 set thread context of 600 2172 svchos.exe 37 PID 348 set thread context of 2196 348 svchos.exe 40 PID 2196 set thread context of 2420 2196 svchos.exe 41 PID 644 set thread context of 1624 644 svchos.exe 42 PID 2124 set thread context of 2036 2124 svchos.exe 47 PID 2036 set thread context of 1596 2036 svchos.exe 48 PID 2264 set thread context of 2748 2264 svchos.exe 49 PID 548 set thread context of 2452 548 svchos.exe 50 PID 612 set thread context of 3032 612 svchos.exe 52 PID 3032 set thread context of 1176 3032 svchos.exe 53 PID 2608 set thread context of 1628 2608 svchos.exe 56 PID 1628 set thread context of 1068 1628 svchos.exe 57 PID 1924 set thread context of 1288 1924 svchos.exe 59 PID 1288 set thread context of 2408 1288 svchos.exe 60 PID 2160 set thread context of 1168 2160 svchos.exe 61 PID 1168 set thread context of 2428 1168 svchos.exe 63 PID 2488 set thread context of 2676 2488 svchos.exe 64 PID 1504 set thread context of 2652 1504 svchos.exe 68 PID 2652 set thread context of 1380 2652 svchos.exe 69 -
resource yara_rule behavioral1/memory/3036-80-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-78-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-76-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-83-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-85-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-84-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-86-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-87-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-90-0x0000000001610000-0x0000000001712000-memory.dmp upx behavioral1/memory/3036-89-0x0000000001610000-0x0000000001712000-memory.dmp upx -
Drops file in Windows directory 19 IoCs
description ioc Process File opened for modification C:\Windows\Microsoft\ JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File created C:\Windows\Microsoft\svchos.exe JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe File opened for modification C:\Windows\Microsoft\svchos.exe svchos.exe File opened for modification C:\Windows\Microsoft\ svchos.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 38 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchos.exe -
Modifies registry class 35 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe Key created \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_Classes\Local Settings svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\MRUListEx = ffffffff svchost.exe Set value (data) \REGISTRY\USER\S-1-5-21-677481364-2238709445-1347953534-1000_CLASSES\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\NodeSlots svchost.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3036 svchost.exe 2420 svchost.exe 1596 svchost.exe 1176 svchost.exe 1068 svchost.exe 2408 svchost.exe 2428 svchost.exe 1380 svchost.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 2672 svchost.exe 3036 svchost.exe 3036 svchost.exe 2420 svchost.exe 1596 svchost.exe 1176 svchost.exe 1176 svchost.exe 1068 svchost.exe 1068 svchost.exe 2408 svchost.exe 2408 svchost.exe 2428 svchost.exe 2428 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2824 wrote to memory of 2828 2824 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 30 PID 2828 wrote to memory of 2444 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 31 PID 2828 wrote to memory of 2444 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 31 PID 2828 wrote to memory of 2444 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 31 PID 2828 wrote to memory of 2444 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 31 PID 2828 wrote to memory of 2444 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 31 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 32 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 32 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 32 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 32 PID 2828 wrote to memory of 2672 2828 JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe 32 PID 2672 wrote to memory of 2008 2672 svchost.exe 33 PID 2672 wrote to memory of 2008 2672 svchost.exe 33 PID 2672 wrote to memory of 2008 2672 svchost.exe 33 PID 2672 wrote to memory of 2008 2672 svchost.exe 33 PID 2444 wrote to memory of 2172 2444 svchost.exe 34 PID 2444 wrote to memory of 2172 2444 svchost.exe 34 PID 2444 wrote to memory of 2172 2444 svchost.exe 34 PID 2444 wrote to memory of 2172 2444 svchost.exe 34 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2008 wrote to memory of 2092 2008 svchos.exe 35 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2092 wrote to memory of 3036 2092 svchos.exe 36 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2172 wrote to memory of 600 2172 svchos.exe 37 PID 2444 wrote to memory of 348 2444 svchost.exe 38 PID 2444 wrote to memory of 348 2444 svchost.exe 38
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exeC:\Users\Admin\AppData\Local\Temp\JaffaCakes118_09e80c7246e970032b1c8fb0fcd9ded4.exe2⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Boot or Logon Autostart Execution: Active Setup
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:600
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:348 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2420
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:644 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1624
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2264 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2748
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2124 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1596
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:548 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2452
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:612 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:3032 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1176
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2608 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1628 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1068
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1924 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1288 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2408
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2160 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:1168 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:2428
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2488 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2676
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1504 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1380
-
-
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
PID:1964
-
-
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
PID:2896
-
-
-
C:\Windows\SysWOW64\svchost.exesvchost.exe3⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\Microsoft\svchos.exe"C:\Windows\Microsoft\svchos.exe"4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Windows\Microsoft\svchos.exeC:\Windows\Microsoft\svchos.exe5⤵
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Windows\SysWOW64\svchost.exesvchost.exe6⤵
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3036
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Privilege Escalation
Boot or Logon Autostart Execution
2Active Setup
1Registry Run Keys / Startup Folder
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD58a7b557c31a1ac886e87139aa67a1f4e
SHA17d2298ab9e1500a574771f8c9297bf8dea195ac0
SHA256bb1e8279f58939851194d9585bad475468190a422b02d592b96728f3e5bc488d
SHA51243cbc55882ebe45890fae0d6b8ed15f57daa9662d2697a36f926460ad8e529cbb9cf149e8a4bce6c1529e16fccc27935bd0dddab943f8e0ca15d8d27a7a984e1
-
Filesize
2B
MD584cad01fdb44ae58dbe6c3973dcd87f5
SHA14700b42849fb35be323774820bf1bc8019d26c80
SHA2568b1f194be530240c18bf0b1ee0d038e750fab8b24c6bd25c864297e5ebb41fa6
SHA5126e10d3ec4724c1aca9ff3f6a26292ba80065d18e8e9395f1474c0a298008f25e312e2f7024e7d10aab3264764e69a25553cc20afd23090f83921d20e42b989ab
-
Filesize
343KB
MD56426d400c96fb9ffef4eaa54f6647f4c
SHA170a37871aff432790b6adf7d3fc4eb929476e082
SHA25698bba0cf4c57ecd35b227f45e4aa6dd50ef7cfb1160235cc14687c96eb09fa3c
SHA5122c8b4d3ab066cbfca6cf0c8d89d5044152b5e3d7100249cbedd1c816e3a4a94efc8bc6b79c1dab4bdf96e3ce476d6caccf625cfbe0aff3bf5e7a29dfcfa948c5
-
Filesize
668KB
MD509e80c7246e970032b1c8fb0fcd9ded4
SHA1534012a13b5e523128a2acee591aff057cf2d798
SHA2567981d1d59a3d2328fa24c378de5ded0f1605764e58910fe9c82a91d544c381aa
SHA512a7ba8fec81432e77c4e381dba1482e9c45519a8d39f3fc445896a9b75d2cb073b57bcda2e6aaa804138a20564791d48920b65a586b59356ab4934900a623bb63