Analysis
-
max time kernel
148s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30/03/2025, 11:56
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe
-
Size
194KB
-
MD5
98a433fd1e5e9ec0123a90f2fd51f3b3
-
SHA1
b14a64c4fe09357bff5da6081114aa752799a0f3
-
SHA256
bfdbc82c506fe324f7b6dd5223c3eabb4562e32f4b0e7bd51448489a18ac5b07
-
SHA512
e7658ea14d0bdcf388f54d69c029313983b9ce72b4b8b1d2bda9b0aeafd26deb84af2550ff2304c00ec5cc76c2b0c111318d0e9814f0fa6a50286b357ca6465c
-
SSDEEP
6144:a9rfJIqw2hj6rVwitWLbXaLOxf1LMWRaze2Jsj:aBfJI7Z4zayxflYsj
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Deletes itself 1 IoCs
pid Process 2864 PrvHstMgs.exe -
Executes dropped EXE 64 IoCs
pid Process 2464 PrvHstMgs.exe 2864 PrvHstMgs.exe 2660 PrvHstMgs.exe 2632 PrvHstMgs.exe 1124 PrvHstMgs.exe 2980 PrvHstMgs.exe 2920 PrvHstMgs.exe 1964 PrvHstMgs.exe 1232 PrvHstMgs.exe 3056 PrvHstMgs.exe 1516 PrvHstMgs.exe 904 PrvHstMgs.exe 2036 PrvHstMgs.exe 2068 PrvHstMgs.exe 280 PrvHstMgs.exe 2112 PrvHstMgs.exe 976 PrvHstMgs.exe 1980 PrvHstMgs.exe 876 PrvHstMgs.exe 1548 PrvHstMgs.exe 2516 PrvHstMgs.exe 2416 PrvHstMgs.exe 3004 PrvHstMgs.exe 2636 PrvHstMgs.exe 2660 PrvHstMgs.exe 2880 PrvHstMgs.exe 2844 PrvHstMgs.exe 1948 PrvHstMgs.exe 2272 PrvHstMgs.exe 1408 PrvHstMgs.exe 2232 PrvHstMgs.exe 1792 PrvHstMgs.exe 2116 PrvHstMgs.exe 1916 PrvHstMgs.exe 2040 PrvHstMgs.exe 2348 PrvHstMgs.exe 604 PrvHstMgs.exe 3032 PrvHstMgs.exe 2292 PrvHstMgs.exe 2588 PrvHstMgs.exe 1580 PrvHstMgs.exe 316 PrvHstMgs.exe 792 PrvHstMgs.exe 2456 PrvHstMgs.exe 2824 PrvHstMgs.exe 2384 PrvHstMgs.exe 2776 PrvHstMgs.exe 2608 PrvHstMgs.exe 824 PrvHstMgs.exe 1616 PrvHstMgs.exe 2500 PrvHstMgs.exe 2912 PrvHstMgs.exe 2236 PrvHstMgs.exe 1864 PrvHstMgs.exe 888 PrvHstMgs.exe 408 PrvHstMgs.exe 836 PrvHstMgs.exe 1860 PrvHstMgs.exe 840 PrvHstMgs.exe 564 PrvHstMgs.exe 2196 PrvHstMgs.exe 2276 PrvHstMgs.exe 1120 PrvHstMgs.exe 1656 PrvHstMgs.exe -
Loads dropped DLL 64 IoCs
pid Process 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 2464 PrvHstMgs.exe 2864 PrvHstMgs.exe 2864 PrvHstMgs.exe 2632 PrvHstMgs.exe 2632 PrvHstMgs.exe 2980 PrvHstMgs.exe 2980 PrvHstMgs.exe 1964 PrvHstMgs.exe 1964 PrvHstMgs.exe 3056 PrvHstMgs.exe 3056 PrvHstMgs.exe 904 PrvHstMgs.exe 904 PrvHstMgs.exe 2068 PrvHstMgs.exe 2068 PrvHstMgs.exe 2112 PrvHstMgs.exe 2112 PrvHstMgs.exe 1980 PrvHstMgs.exe 1980 PrvHstMgs.exe 1548 PrvHstMgs.exe 1548 PrvHstMgs.exe 2416 PrvHstMgs.exe 2416 PrvHstMgs.exe 2636 PrvHstMgs.exe 2636 PrvHstMgs.exe 2880 PrvHstMgs.exe 2880 PrvHstMgs.exe 1948 PrvHstMgs.exe 1948 PrvHstMgs.exe 1408 PrvHstMgs.exe 1408 PrvHstMgs.exe 1792 PrvHstMgs.exe 1792 PrvHstMgs.exe 1916 PrvHstMgs.exe 1916 PrvHstMgs.exe 2348 PrvHstMgs.exe 2348 PrvHstMgs.exe 3032 PrvHstMgs.exe 3032 PrvHstMgs.exe 2588 PrvHstMgs.exe 2588 PrvHstMgs.exe 316 PrvHstMgs.exe 316 PrvHstMgs.exe 2456 PrvHstMgs.exe 2456 PrvHstMgs.exe 2384 PrvHstMgs.exe 2384 PrvHstMgs.exe 2608 PrvHstMgs.exe 2608 PrvHstMgs.exe 1616 PrvHstMgs.exe 1616 PrvHstMgs.exe 2912 PrvHstMgs.exe 2912 PrvHstMgs.exe 1864 PrvHstMgs.exe 1864 PrvHstMgs.exe 408 PrvHstMgs.exe 408 PrvHstMgs.exe 1860 PrvHstMgs.exe 1860 PrvHstMgs.exe 564 PrvHstMgs.exe 564 PrvHstMgs.exe 2276 PrvHstMgs.exe -
Maps connected drives based on registry 3 TTPs 64 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PrvHstMgs.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 PrvHstMgs.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File created C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe File opened for modification C:\Windows\SysWOW64\PrvHstMgs.exe PrvHstMgs.exe -
Suspicious use of SetThreadContext 49 IoCs
description pid Process procid_target PID 2520 set thread context of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2464 set thread context of 2864 2464 PrvHstMgs.exe 33 PID 2660 set thread context of 2632 2660 PrvHstMgs.exe 35 PID 1124 set thread context of 2980 1124 PrvHstMgs.exe 37 PID 2920 set thread context of 1964 2920 PrvHstMgs.exe 39 PID 1232 set thread context of 3056 1232 PrvHstMgs.exe 41 PID 1516 set thread context of 904 1516 PrvHstMgs.exe 43 PID 2036 set thread context of 2068 2036 PrvHstMgs.exe 45 PID 280 set thread context of 2112 280 PrvHstMgs.exe 47 PID 976 set thread context of 1980 976 PrvHstMgs.exe 49 PID 876 set thread context of 1548 876 PrvHstMgs.exe 51 PID 2516 set thread context of 2416 2516 PrvHstMgs.exe 53 PID 3004 set thread context of 2636 3004 PrvHstMgs.exe 55 PID 2660 set thread context of 2880 2660 PrvHstMgs.exe 57 PID 2844 set thread context of 1948 2844 PrvHstMgs.exe 59 PID 2272 set thread context of 1408 2272 PrvHstMgs.exe 61 PID 2232 set thread context of 1792 2232 PrvHstMgs.exe 63 PID 2116 set thread context of 1916 2116 PrvHstMgs.exe 65 PID 2040 set thread context of 2348 2040 PrvHstMgs.exe 67 PID 604 set thread context of 3032 604 PrvHstMgs.exe 69 PID 2292 set thread context of 2588 2292 PrvHstMgs.exe 71 PID 1580 set thread context of 316 1580 PrvHstMgs.exe 73 PID 792 set thread context of 2456 792 PrvHstMgs.exe 75 PID 2824 set thread context of 2384 2824 PrvHstMgs.exe 77 PID 2776 set thread context of 2608 2776 PrvHstMgs.exe 79 PID 824 set thread context of 1616 824 PrvHstMgs.exe 81 PID 2500 set thread context of 2912 2500 PrvHstMgs.exe 84 PID 2236 set thread context of 1864 2236 PrvHstMgs.exe 86 PID 888 set thread context of 408 888 PrvHstMgs.exe 88 PID 836 set thread context of 1860 836 PrvHstMgs.exe 90 PID 840 set thread context of 564 840 PrvHstMgs.exe 92 PID 2196 set thread context of 2276 2196 PrvHstMgs.exe 94 PID 1120 set thread context of 1656 1120 PrvHstMgs.exe 96 PID 2696 set thread context of 284 2696 PrvHstMgs.exe 98 PID 2396 set thread context of 1936 2396 PrvHstMgs.exe 100 PID 2832 set thread context of 2464 2832 PrvHstMgs.exe 102 PID 2812 set thread context of 3004 2812 PrvHstMgs.exe 104 PID 1044 set thread context of 1992 1044 PrvHstMgs.exe 106 PID 1608 set thread context of 2936 1608 PrvHstMgs.exe 108 PID 2652 set thread context of 1440 2652 PrvHstMgs.exe 110 PID 2580 set thread context of 2284 2580 PrvHstMgs.exe 112 PID 2140 set thread context of 1960 2140 PrvHstMgs.exe 114 PID 1612 set thread context of 1032 1612 PrvHstMgs.exe 116 PID 2380 set thread context of 728 2380 PrvHstMgs.exe 118 PID 2596 set thread context of 936 2596 PrvHstMgs.exe 120 PID 1808 set thread context of 928 1808 PrvHstMgs.exe 122 PID 2564 set thread context of 2752 2564 PrvHstMgs.exe 124 PID 2440 set thread context of 2860 2440 PrvHstMgs.exe 126 PID 2412 set thread context of 2784 2412 PrvHstMgs.exe 128 -
resource yara_rule behavioral1/memory/684-5-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-13-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-14-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-12-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-11-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-3-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-2-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/684-28-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2864-43-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2864-41-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2864-40-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2864-42-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2864-49-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2632-60-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2632-63-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2632-62-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2632-61-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2632-69-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2980-83-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2980-89-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1964-104-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1964-110-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/3056-124-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/3056-131-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/904-145-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/904-150-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2068-165-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2068-171-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2112-185-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2112-192-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1980-206-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1980-212-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1548-226-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1548-233-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2416-247-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2416-253-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2636-267-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2636-272-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2880-287-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2880-293-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1948-306-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1948-309-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1408-322-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1408-325-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1792-336-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1792-341-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1916-354-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1916-357-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2348-368-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2348-373-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/3032-384-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/3032-389-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2588-400-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2588-405-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/316-416-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/316-421-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2456-434-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2456-437-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2384-450-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2384-453-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2608-466-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/2608-469-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1616-481-0x0000000000400000-0x000000000046D000-memory.dmp upx behavioral1/memory/1616-485-0x0000000000400000-0x000000000046D000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PrvHstMgs.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 2864 PrvHstMgs.exe 2632 PrvHstMgs.exe 2980 PrvHstMgs.exe 1964 PrvHstMgs.exe 3056 PrvHstMgs.exe 904 PrvHstMgs.exe 2068 PrvHstMgs.exe 2112 PrvHstMgs.exe 1980 PrvHstMgs.exe 1548 PrvHstMgs.exe 2416 PrvHstMgs.exe 2636 PrvHstMgs.exe 2880 PrvHstMgs.exe 1948 PrvHstMgs.exe 1408 PrvHstMgs.exe 1792 PrvHstMgs.exe 1916 PrvHstMgs.exe 2348 PrvHstMgs.exe 3032 PrvHstMgs.exe 2588 PrvHstMgs.exe 316 PrvHstMgs.exe 2456 PrvHstMgs.exe 2384 PrvHstMgs.exe 2608 PrvHstMgs.exe 1616 PrvHstMgs.exe 2912 PrvHstMgs.exe 1864 PrvHstMgs.exe 408 PrvHstMgs.exe 1860 PrvHstMgs.exe 564 PrvHstMgs.exe 2276 PrvHstMgs.exe 1656 PrvHstMgs.exe 284 PrvHstMgs.exe 1936 PrvHstMgs.exe 2464 PrvHstMgs.exe 3004 PrvHstMgs.exe 1992 PrvHstMgs.exe 2936 PrvHstMgs.exe 1440 PrvHstMgs.exe 2284 PrvHstMgs.exe 1960 PrvHstMgs.exe 1032 PrvHstMgs.exe 728 PrvHstMgs.exe 936 PrvHstMgs.exe 928 PrvHstMgs.exe 2752 PrvHstMgs.exe 2860 PrvHstMgs.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 2520 wrote to memory of 684 2520 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 31 PID 684 wrote to memory of 2464 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 32 PID 684 wrote to memory of 2464 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 32 PID 684 wrote to memory of 2464 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 32 PID 684 wrote to memory of 2464 684 JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe 32 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2464 wrote to memory of 2864 2464 PrvHstMgs.exe 33 PID 2864 wrote to memory of 2660 2864 PrvHstMgs.exe 34 PID 2864 wrote to memory of 2660 2864 PrvHstMgs.exe 34 PID 2864 wrote to memory of 2660 2864 PrvHstMgs.exe 34 PID 2864 wrote to memory of 2660 2864 PrvHstMgs.exe 34 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2660 wrote to memory of 2632 2660 PrvHstMgs.exe 35 PID 2632 wrote to memory of 1124 2632 PrvHstMgs.exe 36 PID 2632 wrote to memory of 1124 2632 PrvHstMgs.exe 36 PID 2632 wrote to memory of 1124 2632 PrvHstMgs.exe 36 PID 2632 wrote to memory of 1124 2632 PrvHstMgs.exe 36 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 1124 wrote to memory of 2980 1124 PrvHstMgs.exe 37 PID 2980 wrote to memory of 2920 2980 PrvHstMgs.exe 38 PID 2980 wrote to memory of 2920 2980 PrvHstMgs.exe 38 PID 2980 wrote to memory of 2920 2980 PrvHstMgs.exe 38 PID 2980 wrote to memory of 2920 2980 PrvHstMgs.exe 38 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 2920 wrote to memory of 1964 2920 PrvHstMgs.exe 39 PID 1964 wrote to memory of 1232 1964 PrvHstMgs.exe 40 PID 1964 wrote to memory of 1232 1964 PrvHstMgs.exe 40 PID 1964 wrote to memory of 1232 1964 PrvHstMgs.exe 40 PID 1964 wrote to memory of 1232 1964 PrvHstMgs.exe 40 PID 1232 wrote to memory of 3056 1232 PrvHstMgs.exe 41 PID 1232 wrote to memory of 3056 1232 PrvHstMgs.exe 41 PID 1232 wrote to memory of 3056 1232 PrvHstMgs.exe 41 PID 1232 wrote to memory of 3056 1232 PrvHstMgs.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_98a433fd1e5e9ec0123a90f2fd51f3b3.exe"2⤵
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:684 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Users\Admin\AppData\Local\Temp\JAFFAC~1.EXE4⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE6⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE8⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE10⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE12⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3056 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1516 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE14⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:904 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2036 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE16⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2068 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE17⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:280 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE18⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2112 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE19⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:976 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE20⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1980 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE21⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:876 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE22⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1548 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE23⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2516 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE24⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2416 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE25⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3004 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE26⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2636 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE27⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2660 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE28⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2880 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE29⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2844 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE30⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1948 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE31⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2272 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE32⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1408 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE33⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2232 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE34⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1792 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE35⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2116 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE36⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1916 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE37⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2040 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE38⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2348 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE39⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:604 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE40⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3032 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE41⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2292 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE42⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2588 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE43⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1580 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE44⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:316 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE45⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:792 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE46⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2456 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE47⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2824 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE48⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2384 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE49⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2776 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE50⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2608 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE51⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:824 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE52⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1616 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE53⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2500 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE54⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2912 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE55⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2236 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE56⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1864 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE57⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:888 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE58⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:408 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE59⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:836 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE60⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1860 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE61⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:840 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE62⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:564 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE63⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2196 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE64⤵
- Executes dropped EXE
- Loads dropped DLL
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2276 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE65⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1120 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE66⤵
- Executes dropped EXE
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1656 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE67⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2696 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE68⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:284 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE69⤵
- Suspicious use of SetThreadContext
PID:2396 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE70⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1936 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE71⤵
- Suspicious use of SetThreadContext
PID:2832 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE72⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2464 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE73⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2812 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE74⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:3004 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE75⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1044 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE76⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1992 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE77⤵
- Suspicious use of SetThreadContext
PID:1608 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE78⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2936 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE79⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2652 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE80⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1440 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE81⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2580 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE82⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2284 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE83⤵
- Suspicious use of SetThreadContext
PID:2140 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE84⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1960 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE85⤵
- Suspicious use of SetThreadContext
PID:1612 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE86⤵
- Maps connected drives based on registry
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1032 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE87⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2380 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE88⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:728 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE89⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2596 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE90⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:936 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE91⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:1808 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE92⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:928 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE93⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2564 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE94⤵
- Maps connected drives based on registry
- Suspicious behavior: EnumeratesProcesses
PID:2752 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE95⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2440 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE96⤵
- Maps connected drives based on registry
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:2860 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE97⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:2412 -
C:\Windows\SysWOW64\PrvHstMgs.exe"C:\Windows\system32\PrvHstMgs.exe" C:\Windows\SysWOW64\PRVHST~1.EXE98⤵
- Maps connected drives based on registry
PID:2784
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
194KB
MD598a433fd1e5e9ec0123a90f2fd51f3b3
SHA1b14a64c4fe09357bff5da6081114aa752799a0f3
SHA256bfdbc82c506fe324f7b6dd5223c3eabb4562e32f4b0e7bd51448489a18ac5b07
SHA512e7658ea14d0bdcf388f54d69c029313983b9ce72b4b8b1d2bda9b0aeafd26deb84af2550ff2304c00ec5cc76c2b0c111318d0e9814f0fa6a50286b357ca6465c