Analysis
-
max time kernel
149s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2025, 04:51
Behavioral task
behavioral1
Sample
JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe
Resource
win10v2004-20250314-en
General
-
Target
JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe
-
Size
288KB
-
MD5
9de98cdadcfdae589f98eb39bd0c8bb5
-
SHA1
8383e74a018001d0e2f63a4d1db8e311e647c0cf
-
SHA256
8fd31c2e2561c330f23b0cc0e36f70a3b7fedc2bd08c02d1f3f2dd06308f8161
-
SHA512
f578d0622fd57c9c8986d93260d19bc92dda9cb061ffa77fc060aba273ddd5f5daec4ec844d042d8156e25f9341ba835ce9b38d83263fdf71cac66162c3e105f
-
SSDEEP
6144:ddymWtV751hbG5wf+BAcj0qKHWYt7b4bdL+8tvz4AroS:L6joBE3HXt70bNQAroS
Malware Config
Signatures
-
Blackshades
Blackshades is a remote access trojan with various capabilities.
-
Blackshades family
-
Blackshades payload 30 IoCs
resource yara_rule behavioral1/memory/4808-60-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2992-107-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/624-136-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4808-137-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5500-167-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4808-168-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5732-200-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/396-230-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4924-259-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4808-260-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5600-292-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2224-320-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5304-349-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2044-382-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4336-411-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5556-438-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4876-470-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/3656-498-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4036-523-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/4040-551-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/1672-575-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5020-604-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/2016-629-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5632-653-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/448-681-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/3496-705-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/3580-728-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5200-756-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/1224-781-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades behavioral1/memory/5988-804-0x0000000000400000-0x000000000045C000-memory.dmp family_blackshades -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe, C:\\Program Files (x86)\\Internet Explorer\\Ieupdate.exe" reg.exe -
Modifies firewall policy service 3 TTPs 10 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Program Files (x86)\Internet Explorer\Ieupdate.exe = "C:\\Program Files (x86)\\Internet Explorer\\Ieupdate.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile reg.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DoNotAllowExceptions = "0" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\vb6.exe = "C:\\Users\\Admin\\AppData\\Roaming\\vb6.exe:*:Enabled:Windows Messanger" reg.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List reg.exe -
UAC bypass 3 TTPs 43 IoCs
description ioc Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" reg.exe -
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run Ieupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\vb6.exe" Ieupdate.exe -
Boot or Logon Autostart Execution: Active Setup 2 TTPs 4 IoCs
Adversaries may achieve persistence by adding a Registry key to the Active Setup of the local machine.
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EAFF07AB-FA6F-2EBB-4DBF-CDBBEA4DDCE3} Ieupdate.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{EAFF07AB-FA6F-2EBB-4DBF-CDBBEA4DDCE3}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\vb6.exe" Ieupdate.exe Key created \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{EAFF07AB-FA6F-2EBB-4DBF-CDBBEA4DDCE3} Ieupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Active Setup\Installed Components\{EAFF07AB-FA6F-2EBB-4DBF-CDBBEA4DDCE3}\StubPath = "C:\\Users\\Admin\\AppData\\Roaming\\vb6.exe" Ieupdate.exe -
Checks computer location settings 2 TTPs 44 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe Key value queried \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\Control Panel\International\Geo\Nation vb6.exe -
Executes dropped EXE 64 IoCs
pid Process 1452 Ieupdate.exe 4808 Ieupdate.exe 4856 Ieupdate.exe 3124 vb6.exe 1392 vb6.exe 2992 vb6.exe 5108 vb6.exe 3508 vb6.exe 624 vb6.exe 408 vb6.exe 1008 vb6.exe 5500 vb6.exe 4788 vb6.exe 4800 vb6.exe 5732 vb6.exe 2652 vb6.exe 2548 vb6.exe 396 vb6.exe 4912 vb6.exe 2136 vb6.exe 4924 vb6.exe 1788 vb6.exe 4148 vb6.exe 5600 vb6.exe 1660 vb6.exe 5588 vb6.exe 2224 vb6.exe 2668 vb6.exe 4804 vb6.exe 5304 vb6.exe 4728 vb6.exe 5664 vb6.exe 2044 vb6.exe 2964 vb6.exe 1912 vb6.exe 4336 vb6.exe 2200 vb6.exe 1100 vb6.exe 5556 vb6.exe 5404 vb6.exe 4300 vb6.exe 4876 vb6.exe 2396 vb6.exe 368 vb6.exe 3656 vb6.exe 708 vb6.exe 4448 vb6.exe 4036 vb6.exe 5900 vb6.exe 5340 vb6.exe 4040 vb6.exe 5572 vb6.exe 5048 vb6.exe 1672 vb6.exe 6072 vb6.exe 2588 vb6.exe 5020 vb6.exe 4768 vb6.exe 2724 vb6.exe 2016 vb6.exe 5684 vb6.exe 3784 vb6.exe 5632 vb6.exe 2760 vb6.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\IeUpdate = "C:\\Program Files (x86)\\Internet Explorer\\Ieupdate.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\IeUpdate = "C:\\Program Files (x86)\\Internet Explorer\\Ieupdate.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\vb6.exe" Ieupdate.exe Set value (str) \REGISTRY\USER\S-1-5-21-814918696-1585701690-3140955116-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft = "C:\\Users\\Admin\\AppData\\Roaming\\vb6.exe" Ieupdate.exe -
Checks whether UAC is enabled 1 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA Ieupdate.exe -
Suspicious use of SetThreadContext 44 IoCs
description pid Process procid_target PID 1452 set thread context of 4808 1452 Ieupdate.exe 108 PID 1452 set thread context of 4856 1452 Ieupdate.exe 109 PID 3124 set thread context of 2992 3124 vb6.exe 132 PID 3508 set thread context of 624 3508 vb6.exe 147 PID 408 set thread context of 5500 408 vb6.exe 159 PID 4788 set thread context of 5732 4788 vb6.exe 172 PID 2652 set thread context of 396 2652 vb6.exe 183 PID 2136 set thread context of 4924 2136 vb6.exe 194 PID 1788 set thread context of 5600 1788 vb6.exe 205 PID 1660 set thread context of 2224 1660 vb6.exe 216 PID 2668 set thread context of 5304 2668 vb6.exe 228 PID 5664 set thread context of 2044 5664 vb6.exe 240 PID 2964 set thread context of 4336 2964 vb6.exe 254 PID 2200 set thread context of 5556 2200 vb6.exe 268 PID 5404 set thread context of 4876 5404 vb6.exe 279 PID 368 set thread context of 3656 368 vb6.exe 290 PID 708 set thread context of 4036 708 vb6.exe 301 PID 5900 set thread context of 4040 5900 vb6.exe 312 PID 5572 set thread context of 1672 5572 vb6.exe 323 PID 6072 set thread context of 5020 6072 vb6.exe 334 PID 4768 set thread context of 2016 4768 vb6.exe 345 PID 3784 set thread context of 5632 3784 vb6.exe 356 PID 5108 set thread context of 448 5108 vb6.exe 368 PID 3260 set thread context of 3496 3260 vb6.exe 379 PID 620 set thread context of 3580 620 vb6.exe 390 PID 4424 set thread context of 5200 4424 vb6.exe 401 PID 3336 set thread context of 1224 3336 vb6.exe 412 PID 5684 set thread context of 5988 5684 vb6.exe 423 PID 4648 set thread context of 400 4648 vb6.exe 434 PID 5596 set thread context of 2408 5596 vb6.exe 445 PID 3688 set thread context of 224 3688 vb6.exe 456 PID 908 set thread context of 2528 908 vb6.exe 467 PID 4464 set thread context of 2816 4464 vb6.exe 478 PID 3124 set thread context of 3628 3124 vb6.exe 489 PID 5684 set thread context of 3648 5684 vb6.exe 500 PID 2760 set thread context of 6024 2760 vb6.exe 511 PID 5372 set thread context of 2404 5372 vb6.exe 522 PID 3752 set thread context of 5784 3752 vb6.exe 533 PID 4540 set thread context of 2640 4540 vb6.exe 544 PID 3208 set thread context of 3592 3208 vb6.exe 555 PID 3392 set thread context of 5856 3392 vb6.exe 566 PID 1972 set thread context of 1416 1972 vb6.exe 577 PID 5108 set thread context of 2416 5108 vb6.exe 588 PID 2728 set thread context of 2936 2728 vb6.exe 599 -
resource yara_rule behavioral1/memory/5832-0-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/files/0x000d0000000240c1-40.dat upx behavioral1/memory/5832-55-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4808-56-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4808-58-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4808-60-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4856-63-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/4856-65-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/4856-67-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1452-75-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/1392-89-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/1392-93-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/3124-100-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2992-107-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/3508-110-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/5108-115-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/3508-133-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/624-136-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4808-137-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4856-138-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/1008-152-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/408-161-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/5500-167-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4808-168-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4800-185-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4788-194-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/5732-200-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2548-203-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2548-215-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2652-224-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/396-230-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2136-238-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4912-240-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4912-236-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2136-254-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4924-259-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4808-260-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4148-277-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/1788-286-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/5600-292-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/5588-306-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/1660-318-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2224-320-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4804-334-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2668-343-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/5304-349-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/5664-379-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2044-382-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/1912-396-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/2964-408-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4336-411-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/5556-438-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/5404-466-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4876-470-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/2396-484-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/368-495-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/3656-498-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/4448-510-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/708-517-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4036-523-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/5340-539-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/4040-551-0x0000000000400000-0x000000000045C000-memory.dmp upx behavioral1/memory/5572-572-0x0000000000400000-0x00000000005A8000-memory.dmp upx behavioral1/memory/1672-575-0x0000000000400000-0x000000000045C000-memory.dmp upx -
Drops file in Program Files directory 5 IoCs
description ioc Process File created C:\Program Files (x86)\Internet Explorer\Ieupdate.txt JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe File opened for modification C:\Program Files (x86)\Internet Explorer\Ieupdate.txt JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe File created C:\Program Files (x86)\Internet Explorer\Ieupdate.exe JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe File opened for modification C:\Program Files (x86)\Internet Explorer\Ieupdate.exe Ieupdate.exe File opened for modification C:\Program Files (x86)\Internet Explorer\Ieupdate.exe Ieupdate.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 64 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Ieupdate.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language vb6.exe -
Modifies registry key 1 TTPs 4 IoCs
pid Process 964 reg.exe 4180 reg.exe 4076 reg.exe 1988 reg.exe -
Suspicious use of AdjustPrivilegeToken 37 IoCs
description pid Process Token: SeDebugPrivilege 4856 Ieupdate.exe Token: 1 4808 Ieupdate.exe Token: SeCreateTokenPrivilege 4808 Ieupdate.exe Token: SeAssignPrimaryTokenPrivilege 4808 Ieupdate.exe Token: SeLockMemoryPrivilege 4808 Ieupdate.exe Token: SeIncreaseQuotaPrivilege 4808 Ieupdate.exe Token: SeMachineAccountPrivilege 4808 Ieupdate.exe Token: SeTcbPrivilege 4808 Ieupdate.exe Token: SeSecurityPrivilege 4808 Ieupdate.exe Token: SeTakeOwnershipPrivilege 4808 Ieupdate.exe Token: SeLoadDriverPrivilege 4808 Ieupdate.exe Token: SeSystemProfilePrivilege 4808 Ieupdate.exe Token: SeSystemtimePrivilege 4808 Ieupdate.exe Token: SeProfSingleProcessPrivilege 4808 Ieupdate.exe Token: SeIncBasePriorityPrivilege 4808 Ieupdate.exe Token: SeCreatePagefilePrivilege 4808 Ieupdate.exe Token: SeCreatePermanentPrivilege 4808 Ieupdate.exe Token: SeBackupPrivilege 4808 Ieupdate.exe Token: SeRestorePrivilege 4808 Ieupdate.exe Token: SeShutdownPrivilege 4808 Ieupdate.exe Token: SeDebugPrivilege 4808 Ieupdate.exe Token: SeAuditPrivilege 4808 Ieupdate.exe Token: SeSystemEnvironmentPrivilege 4808 Ieupdate.exe Token: SeChangeNotifyPrivilege 4808 Ieupdate.exe Token: SeRemoteShutdownPrivilege 4808 Ieupdate.exe Token: SeUndockPrivilege 4808 Ieupdate.exe Token: SeSyncAgentPrivilege 4808 Ieupdate.exe Token: SeEnableDelegationPrivilege 4808 Ieupdate.exe Token: SeManageVolumePrivilege 4808 Ieupdate.exe Token: SeImpersonatePrivilege 4808 Ieupdate.exe Token: SeCreateGlobalPrivilege 4808 Ieupdate.exe Token: 31 4808 Ieupdate.exe Token: 32 4808 Ieupdate.exe Token: 33 4808 Ieupdate.exe Token: 34 4808 Ieupdate.exe Token: 35 4808 Ieupdate.exe Token: SeDebugPrivilege 4808 Ieupdate.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 1452 Ieupdate.exe 1452 Ieupdate.exe 4808 Ieupdate.exe 4808 Ieupdate.exe 4856 Ieupdate.exe 4808 Ieupdate.exe 4856 Ieupdate.exe 4808 Ieupdate.exe 3124 vb6.exe 1392 vb6.exe 2992 vb6.exe 2992 vb6.exe 5108 vb6.exe 3508 vb6.exe 624 vb6.exe 624 vb6.exe 408 vb6.exe 1008 vb6.exe 5500 vb6.exe 5500 vb6.exe 4788 vb6.exe 4800 vb6.exe 5732 vb6.exe 5732 vb6.exe 2652 vb6.exe 2548 vb6.exe 396 vb6.exe 396 vb6.exe 2136 vb6.exe 4912 vb6.exe 4924 vb6.exe 4924 vb6.exe 1788 vb6.exe 4148 vb6.exe 5600 vb6.exe 5600 vb6.exe 1660 vb6.exe 5588 vb6.exe 2224 vb6.exe 2224 vb6.exe 2668 vb6.exe 4804 vb6.exe 5304 vb6.exe 5304 vb6.exe 4728 vb6.exe 5664 vb6.exe 2044 vb6.exe 2044 vb6.exe 1912 vb6.exe 2964 vb6.exe 4336 vb6.exe 4336 vb6.exe 1100 vb6.exe 2200 vb6.exe 5556 vb6.exe 5556 vb6.exe 5404 vb6.exe 4300 vb6.exe 4876 vb6.exe 4876 vb6.exe 2396 vb6.exe 368 vb6.exe 3656 vb6.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 5832 wrote to memory of 752 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 88 PID 5832 wrote to memory of 752 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 88 PID 5832 wrote to memory of 752 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 88 PID 752 wrote to memory of 1008 752 cmd.exe 91 PID 752 wrote to memory of 1008 752 cmd.exe 91 PID 752 wrote to memory of 1008 752 cmd.exe 91 PID 752 wrote to memory of 4268 752 cmd.exe 92 PID 752 wrote to memory of 4268 752 cmd.exe 92 PID 752 wrote to memory of 4268 752 cmd.exe 92 PID 5832 wrote to memory of 5892 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 94 PID 5832 wrote to memory of 5892 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 94 PID 5832 wrote to memory of 5892 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 94 PID 5892 wrote to memory of 1448 5892 cmd.exe 96 PID 5892 wrote to memory of 1448 5892 cmd.exe 96 PID 5892 wrote to memory of 1448 5892 cmd.exe 96 PID 5832 wrote to memory of 4604 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 99 PID 5832 wrote to memory of 4604 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 99 PID 5832 wrote to memory of 4604 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 99 PID 4604 wrote to memory of 4772 4604 cmd.exe 101 PID 4604 wrote to memory of 4772 4604 cmd.exe 101 PID 4604 wrote to memory of 4772 4604 cmd.exe 101 PID 5832 wrote to memory of 4784 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 104 PID 5832 wrote to memory of 4784 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 104 PID 5832 wrote to memory of 4784 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 104 PID 4784 wrote to memory of 5376 4784 cmd.exe 106 PID 4784 wrote to memory of 5376 4784 cmd.exe 106 PID 4784 wrote to memory of 5376 4784 cmd.exe 106 PID 5832 wrote to memory of 1452 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 107 PID 5832 wrote to memory of 1452 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 107 PID 5832 wrote to memory of 1452 5832 JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe 107 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4808 1452 Ieupdate.exe 108 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 1452 wrote to memory of 4856 1452 Ieupdate.exe 109 PID 4808 wrote to memory of 32 4808 Ieupdate.exe 110 PID 4808 wrote to memory of 32 4808 Ieupdate.exe 110 PID 4808 wrote to memory of 32 4808 Ieupdate.exe 110 PID 4808 wrote to memory of 1632 4808 Ieupdate.exe 111 PID 4808 wrote to memory of 1632 4808 Ieupdate.exe 111 PID 4808 wrote to memory of 1632 4808 Ieupdate.exe 111 PID 4808 wrote to memory of 5740 4808 Ieupdate.exe 112 PID 4808 wrote to memory of 5740 4808 Ieupdate.exe 112 PID 4808 wrote to memory of 5740 4808 Ieupdate.exe 112 PID 4808 wrote to memory of 3004 4808 Ieupdate.exe 113 PID 4808 wrote to memory of 3004 4808 Ieupdate.exe 113 PID 4808 wrote to memory of 3004 4808 Ieupdate.exe 113 PID 3004 wrote to memory of 964 3004 cmd.exe 122 PID 3004 wrote to memory of 964 3004 cmd.exe 122 PID 3004 wrote to memory of 964 3004 cmd.exe 122 PID 5740 wrote to memory of 4180 5740 cmd.exe 123 PID 5740 wrote to memory of 4180 5740 cmd.exe 123 PID 5740 wrote to memory of 4180 5740 cmd.exe 123
Processes
-
C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe"C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_9de98cdadcfdae589f98eb39bd0c8bb5.exe"1⤵
- Checks computer location settings
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5832 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:752 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f3⤵PID:1008
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f3⤵
- UAC bypass
PID:4268
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\nleHd.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:5892 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "IeUpdate" /t REG_SZ /d "C:\Program Files (x86)\Internet Explorer\Ieupdate.exe" /f3⤵
- Adds Run key to start application
PID:1448
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\hgpSn.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4604 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKLM\Software\Microsoft\Windows\CurrentVersion\Run" /v "IeUpdate" /t REG_SZ /d "C:\Program Files (x86)\Internet Explorer\Ieupdate.exe" /f3⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:4772
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\GsuPK.bat" "2⤵
- Suspicious use of WriteProcessMemory
PID:4784 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon" /v "Shell" /t REG_SZ /d "Explorer.exe, C:\Program Files (x86)\Internet Explorer\Ieupdate.exe" /f3⤵
- Modifies WinLogon for persistence
PID:5376
-
-
-
C:\Program Files (x86)\Internet Explorer\Ieupdate.exe"C:\Program Files (x86)\Internet Explorer\Ieupdate.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Program Files (x86)\Internet Explorer\Ieupdate.exe"C:\Program Files (x86)\Internet Explorer\Ieupdate.exe"3⤵
- Adds policy Run key to start application
- Boot or Logon Autostart Execution: Active Setup
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- System Location Discovery: System Language Discovery
PID:32 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:1988
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Program Files (x86)\Internet Explorer\Ieupdate.exe" /t REG_SZ /d "C:\Program Files (x86)\Internet Explorer\Ieupdate.exe:*:Enabled:Windows Messanger" /f4⤵PID:1632
-
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Program Files (x86)\Internet Explorer\Ieupdate.exe" /t REG_SZ /d "C:\Program Files (x86)\Internet Explorer\Ieupdate.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- System Location Discovery: System Language Discovery
- Modifies registry key
PID:4076
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f4⤵
- Suspicious use of WriteProcessMemory
PID:5740 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile /v "DoNotAllowExceptions" /t REG_DWORD /d "0" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:4180
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c REG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\vb6.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\vb6.exe:*:Enabled:Windows Messanger" /f4⤵
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Windows\SysWOW64\reg.exeREG ADD HKLM\System\CurrentControlSet\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List /v "C:\Users\Admin\AppData\Roaming\vb6.exe" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\vb6.exe:*:Enabled:Windows Messanger" /f5⤵
- Modifies firewall policy service
- Modifies registry key
PID:964
-
-
-
-
C:\Program Files (x86)\Internet Explorer\Ieupdate.exe"C:\Program Files (x86)\Internet Explorer\Ieupdate.exe"3⤵
- Executes dropped EXE
- Checks whether UAC is enabled
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\Internet Explorer\Ieupdate.exe1⤵PID:4652
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Program Files (x86)\Internet Explorer\Ieupdate.exe1⤵PID:4644
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4844
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:2576
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5260
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5000
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2992
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4012
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1392
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:908
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:3508 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:5880
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5116
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5600
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:624
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3812
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3488
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1008
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2460
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:5468 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1220
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:3184
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5500
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4528
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4800
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2368
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:4788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:5612 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:1188
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1380
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5732
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1916
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:5972
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1516
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1836
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:396
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1108
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:32
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:3968
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:4448
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4812
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4924
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1392
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5608
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:3000
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5440
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2472
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5600
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5444
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4148
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:760
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1660 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:312
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5296
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:2748
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2800
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:5588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2640
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4744 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1188
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1380
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5304
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:960
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4804
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1336
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4728
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4872
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5664 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4640
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1516
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1836
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2044
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1264
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3624 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5924
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1732
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4336
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2760
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4124
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2588
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:3508
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:3688
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:3408
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5556
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5200
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:5404 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4884
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:4056
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:344
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4876
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2812
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4300
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2368
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:1836
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1412
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:6096
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3656
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4492
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2396
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4252
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:4448
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5040
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:708 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3988 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2924
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5072
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
PID:4036
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5060
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:5340
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1792
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5900 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:2112
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:3968
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:2456
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
PID:4040
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4420
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:5572 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:1008
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2936
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4124
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
PID:1672
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3040
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:5048
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:760
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:2588
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4364
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:6072 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4528
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2948
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4460
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
PID:5020
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2816
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:2724
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1380
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:4768 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:264 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1068
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5696
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
PID:2016
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2856
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:5684
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4640
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3784 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:3420
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:1592
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5740
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:5632
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:380
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Executes dropped EXE
PID:2760
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:6024
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4720
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:400
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1788
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:448
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5052
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:3156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4888
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3260 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:1588
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1908
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:1448
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- System Location Discovery: System Language Discovery
PID:3496
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:464
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- System Location Discovery: System Language Discovery
PID:1564
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2876
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:620 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:3996
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:3520
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:2496
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:3580
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4760
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:6072
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4528
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:4424 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4056
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:548
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:4428
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:5200
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1640
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:3336 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:2932
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2980
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1412
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- System Location Discovery: System Language Discovery
PID:1224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2816
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- System Location Discovery: System Language Discovery
PID:1108
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1980
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:3160
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:832
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:5684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:1200
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:3392
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5712
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:5988
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3524
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:4112
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5168
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:4648 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3344 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:1264
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5224
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:400
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5992
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- System Location Discovery: System Language Discovery
PID:3632
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2444
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:5596 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:5372
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2976
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5052
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:2408
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2936
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:3688 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4092 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:4420
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5336
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:224
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4892
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:2500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2080
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:908 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3508 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1728
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4760
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:2528
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2184
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:876
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4796
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:2180
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:6064
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:4464 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:3364
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:4280
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:2928
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:2816
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1380
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:1064
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5472
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3124 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:5284
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2040
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1980
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:3628
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1200
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:5684 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:5924
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:4112
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5868
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:3648
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1944
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- System Location Discovery: System Language Discovery
PID:3500
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1500
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:2760 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:5676
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5516
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:3020
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:6024
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4116
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:5944
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2520
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:5372 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4124
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:2512
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5484
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:2404
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5496
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:2840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3212
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:3752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:4996
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵
- System Location Discovery: System Language Discovery
PID:220
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1904
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:5784
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5716
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:5604
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1144
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:1848
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:876
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:4540 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:3384 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:4532
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:2240
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- System Location Discovery: System Language Discovery
PID:2640
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3668
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
PID:3208 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:636
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:6036
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:868
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:3592
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4980
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:3160
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:3392 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:2944
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:3500
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:1620
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:5856
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5284
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:5032
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2576
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:1972 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:1488 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:3968
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5060
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:1416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5824
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:4252
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5676
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:5108 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:2116
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:1792
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
- System Location Discovery: System Language Discovery
PID:4500
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵
- System Location Discovery: System Language Discovery
PID:2416
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:5888
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:4256
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:212
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- System Location Discovery: System Language Discovery
PID:3980
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:2916
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
PID:2728 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵
- System Location Discovery: System Language Discovery
PID:4816 -
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:464
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵
- UAC bypass
PID:5956
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:2936
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:1448
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵PID:1840
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\vb6.exe1⤵PID:4996
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe2⤵
- Checks computer location settings
PID:5932 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\JNYVYK.bat" "3⤵PID:2836
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center /v UACDisableNotify /t REG_DWORD /d 0 /f4⤵PID:5556
-
-
C:\Windows\SysWOW64\reg.exeREG ADD HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f4⤵PID:4960
-
-
-
C:\Users\Admin\AppData\Roaming\vb6.exeC:\Users\Admin\AppData\Roaming\vb6.exe3⤵PID:2080
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
4Active Setup
1Registry Run Keys / Startup Folder
2Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Defense Evasion
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Impair Defenses
2Disable or Modify System Firewall
1Disable or Modify Tools
1Modify Registry
7Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
288KB
MD55ad86c83a71d9521fbb2bcd34104df97
SHA122cc1cd41ccf4272b4c6cb7e863a080c70d8ca84
SHA256f5543ff4a805dd1d85f133724f6a404abc02b48653d5d3cf93627ed73dcc5588
SHA5120ab1b416abdf8dca9afe0329e02da006947828a531af8f69dac16065ad8f2dcd864a6e46718caa92e6accfc4ee1ff4d323cdb23d69b69f20e4f0b87f0aab9a87
-
Filesize
181B
MD509d67635a7674b12183c3f0668ce0cd1
SHA1c3fe2225cc5198a1c33df0342a95528c2e657a6d
SHA256972e896e8649a5d2caf286a0d75db99909587b1d2f4683870207b547c3bc02d9
SHA512b37bdad4fb0e9ab947ea5750337de073907d31156d0d00a1a79392741ced2d1aabf1cc2d92581d7f068266f82cd5b2c10fd7e5c573044e6ce77dea6da6dde321
-
Filesize
274B
MD59fcec2a4ee61953e0d4867261a39ea32
SHA1d552acf26d9fcc31a9da82ecce503b16a11e9d2a
SHA25624c5da914d1f429c07ef17dfb7d4d0c90eb060e5a9bd009963fba83b1dd6cae3
SHA51257d8a88138645780357a88658f21f833efa0ba657dd1fefa6458ba930731e1949216b518f26ab995241837bc7e6eff90b46e5cb5ec34364d2f89db09779e5564
-
Filesize
148B
MD53d470539cbafa762cdb72a4635ad553d
SHA14bda3e7de91052dc7d073d8b278ad09ad0d10fa6
SHA2569f0571e3567d7e1849c7bd5dd7b7a2be942ec44aea6c8bb32d415874b7282691
SHA51242b168fabd5ddd175ccd143d4f9338880aad03eb22d07fb8a2e13f387015b9eb1d23307bff3ae370c95a5644c88c5e9f7c8b12b332b595c79be069ffc92a448e
-
Filesize
148B
MD55d73853d695283e13b412c88ec62984c
SHA1672379399a80a746a8f0d8043bbf98956101d0ca
SHA25659884297b763a498c1f55e4ba57f04597ab37677feb9b686839e7553942cf335
SHA5129043d02ec14cc4869cc8c01562838c11448e2bff42af32ec0a60de76fa8915c3a3a50529ce567c6cb93d2691525b38862257993674c263ed25f6625e370cb2d2