Analysis
-
max time kernel
95s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
29/03/2025, 20:18
Behavioral task
behavioral1
Sample
JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe
-
Size
164KB
-
MD5
979f3b58bfb137b9365415fb33d7aaa3
-
SHA1
a6976909a55c4f90313a657efe05bab1dbe61b58
-
SHA256
aa8de0c2cc4b1a9ad64f59136d189bb8b914cfe01e04b09b73743ba729a2afb8
-
SHA512
51ddf24af2edb18b2ed55ed53cd2edd507600c642d5906168b247366b42b6a73a055789854252bad690dfb0f753136e018158ddcc55ac42c7f87affb82e653bc
-
SSDEEP
3072:nGbjlUV7Xbs5gwRBr8TbA69YtyxOrh8ZBipCpvAw88AsntWXTSlCXQ9VGLDFG4FW:olUV0gaBAbA69YtWOrDpsNWmtWjSXGVj
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 64 IoCs
resource yara_rule behavioral2/memory/4160-14-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4160-20-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4644-19-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-23-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2984-31-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3080-33-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-36-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3024-52-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/224-50-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1656-66-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2976-65-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3948-79-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3880-81-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1048-93-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2900-95-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-96-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1348-112-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2424-110-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4840-124-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4884-125-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3408-137-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2776-139-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-141-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2640-155-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1788-157-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3188-171-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4020-169-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3360-176-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3360-183-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4584-181-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-184-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3504-198-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/636-200-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3508-213-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4776-214-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2284-226-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4940-228-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4972-243-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1276-245-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1028-257-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4996-259-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-265-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2272-273-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1572-274-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1572-278-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2272-276-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4428-291-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4600-293-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2432-305-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4904-306-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-307-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3452-321-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2208-323-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4728-335-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/448-337-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1048-351-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4848-350-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/5012-352-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3588-367-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1668-368-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/4404-380-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/1656-381-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/3600-393-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades behavioral2/memory/2204-394-0x0000000000400000-0x0000000000473000-memory.dmp family_blackshades -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\svchost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{344BDCED-D184-CFD2-59D0-CA7A9C74FBAF} JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{344BDCED-D184-CFD2-59D0-CA7A9C74FBAF}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{344BDCED-D184-CFD2-59D0-CA7A9C74FBAF} JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{344BDCED-D184-CFD2-59D0-CA7A9C74FBAF}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe -
Executes dropped EXE 56 IoCs
pid Process 4644 svchost.exe 4160 svchost.exe 2984 svchost.exe 3080 svchost.exe 224 svchost.exe 3024 svchost.exe 2976 svchost.exe 1656 svchost.exe 3948 svchost.exe 3880 svchost.exe 1048 svchost.exe 2900 svchost.exe 1348 svchost.exe 2424 svchost.exe 4840 svchost.exe 4884 svchost.exe 3408 svchost.exe 2776 svchost.exe 2640 svchost.exe 1788 svchost.exe 4020 svchost.exe 3188 svchost.exe 4584 svchost.exe 3360 svchost.exe 3504 svchost.exe 636 svchost.exe 4776 svchost.exe 3508 svchost.exe 2284 svchost.exe 4940 svchost.exe 4972 svchost.exe 1276 svchost.exe 1028 svchost.exe 4996 svchost.exe 2272 svchost.exe 1572 svchost.exe 4428 svchost.exe 4600 svchost.exe 4904 svchost.exe 2432 svchost.exe 3452 svchost.exe 2208 svchost.exe 4728 svchost.exe 448 svchost.exe 4848 svchost.exe 1048 svchost.exe 3588 svchost.exe 1668 svchost.exe 1656 svchost.exe 4404 svchost.exe 3600 svchost.exe 2204 svchost.exe 3624 svchost.exe 1120 svchost.exe 4660 svchost.exe 752 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Set value (str) \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe -
resource yara_rule behavioral2/memory/5012-0-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/files/0x000e000000023f6a-7.dat upx behavioral2/memory/4160-14-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4160-20-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4644-19-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-23-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2984-31-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3080-33-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-36-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3024-52-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/224-50-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1656-58-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1656-66-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2976-65-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3880-72-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3948-79-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3880-81-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1048-93-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2900-95-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-96-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1348-112-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2424-110-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4840-124-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4884-125-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3408-137-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2776-139-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-141-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2640-155-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1788-157-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3188-171-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4020-169-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3360-176-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3360-183-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4584-181-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-184-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3504-198-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/636-200-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3508-213-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4776-214-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2284-226-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4940-228-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4972-243-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1276-245-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1028-257-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4996-259-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-265-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2272-273-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1572-274-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1572-278-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2272-276-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4428-291-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4600-293-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2432-305-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4904-306-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-307-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3452-321-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/2208-323-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4728-335-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/448-337-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1048-351-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/4848-350-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/5012-352-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/3588-367-0x0000000000400000-0x0000000000473000-memory.dmp upx behavioral2/memory/1668-368-0x0000000000400000-0x0000000000473000-memory.dmp upx -
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 4972 reg.exe 2784 reg.exe 2576 reg.exe 672 reg.exe -
Suspicious use of AdjustPrivilegeToken 36 IoCs
description pid Process Token: 1 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeCreateTokenPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeAssignPrimaryTokenPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeLockMemoryPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeIncreaseQuotaPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeMachineAccountPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeTcbPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeSecurityPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeTakeOwnershipPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeLoadDriverPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeSystemProfilePrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeSystemtimePrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeProfSingleProcessPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeIncBasePriorityPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeCreatePagefilePrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeCreatePermanentPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeBackupPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeRestorePrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeShutdownPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeDebugPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeAuditPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeSystemEnvironmentPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeChangeNotifyPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeRemoteShutdownPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeUndockPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeSyncAgentPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeEnableDelegationPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeManageVolumePrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeImpersonatePrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeCreateGlobalPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: 31 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: 32 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: 33 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: 34 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: 35 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe Token: SeDebugPrivilege 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 4644 svchost.exe 4644 svchost.exe 4160 svchost.exe 4160 svchost.exe 3080 svchost.exe 2984 svchost.exe 2984 svchost.exe 3080 svchost.exe 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 224 svchost.exe 224 svchost.exe 3024 svchost.exe 3024 svchost.exe 2976 svchost.exe 1656 svchost.exe 2976 svchost.exe 1656 svchost.exe 3948 svchost.exe 3880 svchost.exe 3948 svchost.exe 3880 svchost.exe 1048 svchost.exe 1048 svchost.exe 2900 svchost.exe 2900 svchost.exe 1348 svchost.exe 2424 svchost.exe 2424 svchost.exe 1348 svchost.exe 4840 svchost.exe 4840 svchost.exe 4884 svchost.exe 4884 svchost.exe 3408 svchost.exe 2776 svchost.exe 3408 svchost.exe 2776 svchost.exe 2640 svchost.exe 1788 svchost.exe 2640 svchost.exe 1788 svchost.exe 4020 svchost.exe 4020 svchost.exe 3188 svchost.exe 3188 svchost.exe 4584 svchost.exe 4584 svchost.exe 3504 svchost.exe 636 svchost.exe 3504 svchost.exe 636 svchost.exe 4776 svchost.exe 3508 svchost.exe 3508 svchost.exe 4776 svchost.exe 2284 svchost.exe 4940 svchost.exe 2284 svchost.exe 4940 svchost.exe 4972 svchost.exe 4972 svchost.exe 1276 svchost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5092 wrote to memory of 4644 5092 cmd.exe 98 PID 5092 wrote to memory of 4644 5092 cmd.exe 98 PID 5092 wrote to memory of 4644 5092 cmd.exe 98 PID 1928 wrote to memory of 4160 1928 cmd.exe 99 PID 1928 wrote to memory of 4160 1928 cmd.exe 99 PID 1928 wrote to memory of 4160 1928 cmd.exe 99 PID 1404 wrote to memory of 2984 1404 cmd.exe 105 PID 1404 wrote to memory of 2984 1404 cmd.exe 105 PID 1404 wrote to memory of 2984 1404 cmd.exe 105 PID 3468 wrote to memory of 3080 3468 cmd.exe 106 PID 3468 wrote to memory of 3080 3468 cmd.exe 106 PID 3468 wrote to memory of 3080 3468 cmd.exe 106 PID 5012 wrote to memory of 1212 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 109 PID 5012 wrote to memory of 1212 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 109 PID 5012 wrote to memory of 1212 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 109 PID 5012 wrote to memory of 1276 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 110 PID 5012 wrote to memory of 1276 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 110 PID 5012 wrote to memory of 1276 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 110 PID 5012 wrote to memory of 688 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 111 PID 5012 wrote to memory of 688 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 111 PID 5012 wrote to memory of 688 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 111 PID 5012 wrote to memory of 2872 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 112 PID 5012 wrote to memory of 2872 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 112 PID 5012 wrote to memory of 2872 5012 JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe 112 PID 2872 wrote to memory of 2576 2872 cmd.exe 121 PID 2872 wrote to memory of 2576 2872 cmd.exe 121 PID 2872 wrote to memory of 2576 2872 cmd.exe 121 PID 688 wrote to memory of 672 688 cmd.exe 122 PID 688 wrote to memory of 672 688 cmd.exe 122 PID 688 wrote to memory of 672 688 cmd.exe 122 PID 1212 wrote to memory of 4972 1212 cmd.exe 123 PID 1212 wrote to memory of 4972 1212 cmd.exe 123 PID 1212 wrote to memory of 4972 1212 cmd.exe 123 PID 1480 wrote to memory of 224 1480 cmd.exe 124 PID 1480 wrote to memory of 224 1480 cmd.exe 124 PID 1480 wrote to memory of 224 1480 cmd.exe 124 PID 2000 wrote to memory of 3024 2000 cmd.exe 125 PID 2000 wrote to memory of 3024 2000 cmd.exe 125 PID 2000 wrote to memory of 3024 2000 cmd.exe 125 PID 1276 wrote to memory of 2784 1276 cmd.exe 126 PID 1276 wrote to memory of 2784 1276 cmd.exe 126 PID 1276 wrote to memory of 2784 1276 cmd.exe 126 PID 4496 wrote to memory of 2976 4496 cmd.exe 131 PID 4496 wrote to memory of 2976 4496 cmd.exe 131 PID 4496 wrote to memory of 2976 4496 cmd.exe 131 PID 1668 wrote to memory of 1656 1668 cmd.exe 132 PID 1668 wrote to memory of 1656 1668 cmd.exe 132 PID 1668 wrote to memory of 1656 1668 cmd.exe 132 PID 4160 wrote to memory of 3948 4160 cmd.exe 137 PID 4160 wrote to memory of 3948 4160 cmd.exe 137 PID 4160 wrote to memory of 3948 4160 cmd.exe 137 PID 1680 wrote to memory of 3880 1680 cmd.exe 138 PID 1680 wrote to memory of 3880 1680 cmd.exe 138 PID 1680 wrote to memory of 3880 1680 cmd.exe 138 PID 4940 wrote to memory of 1048 4940 cmd.exe 143 PID 4940 wrote to memory of 1048 4940 cmd.exe 143 PID 4940 wrote to memory of 1048 4940 cmd.exe 143 PID 5088 wrote to memory of 2900 5088 cmd.exe 144 PID 5088 wrote to memory of 2900 5088 cmd.exe 144 PID 5088 wrote to memory of 2900 5088 cmd.exe 144 PID 4668 wrote to memory of 1348 4668 cmd.exe 149 PID 4668 wrote to memory of 1348 4668 cmd.exe 149 PID 4668 wrote to memory of 1348 4668 cmd.exe 149 PID 2268 wrote to memory of 2424 2268 cmd.exe 150
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe"1⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4972
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_979f3b58bfb137b9365415fb33d7aaa3.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2784
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:688 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:672
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\svchost.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svchost.exe:*:Enabled:Windows Messanger" /f3⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:2576
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5092 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4644
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3080
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1480 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4160 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3948
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:5088 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:4668 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1348
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2424
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2704
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4880
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4884
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4780
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4464
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3408
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2828
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2640
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4572
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1788
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4612
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4020
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3896
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3188
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4880
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3360
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1716
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4584
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2828
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3504
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:532
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:636
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2800
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4776
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:936
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1512
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4940
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2560
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4596
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4972
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1056
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:448
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4996
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3852
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1028
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4024
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1572
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4528
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1052
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4428
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3596
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3188
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2204
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2432
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4940
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3452
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4964
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2208
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:940
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2580
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:920
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2804
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3396
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4388
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2936
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4836
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
PID:1656
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2000
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3600
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:688
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2204
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4924
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1120
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3832
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:3624
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1036
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1336
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4480
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:3904
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4264
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3584
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4608
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3748
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2648
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:3588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:376
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:456
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4824
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:636
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4404
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4764
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:2000
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2360
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:320
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:852
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:700
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3148
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1488
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3832
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:752
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4964
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:2532
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:512
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:3852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2436
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:5036
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3672
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:3880
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1376
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4208
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:2820
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:4388
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1224
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3896
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1808
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:636
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4668
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1632
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:2212
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3600
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1508
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3476
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4852
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:2364
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:4660
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1604
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:3696
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:1864
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:672
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\svchost.exe1⤵PID:3148
-
C:\Users\Admin\AppData\Roaming\svchost.exeC:\Users\Admin\AppData\Roaming\svchost.exe2⤵PID:1456
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Privilege Escalation
Boot or Logon Autostart Execution
3Active Setup
1Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
164KB
MD5979f3b58bfb137b9365415fb33d7aaa3
SHA1a6976909a55c4f90313a657efe05bab1dbe61b58
SHA256aa8de0c2cc4b1a9ad64f59136d189bb8b914cfe01e04b09b73743ba729a2afb8
SHA51251ddf24af2edb18b2ed55ed53cd2edd507600c642d5906168b247366b42b6a73a055789854252bad690dfb0f753136e018158ddcc55ac42c7f87affb82e653bc